Search Results - (( _ application ((svm algorithm) OR (ccl algorithm)) ) OR ( web application using algorithm ))*
Search alternatives:
- web application »
- using algorithm »
- svm algorithm »
- ccl algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
Get full text
Get full text
Get full text
Article -
6
Classifying good and bad websites
Published 2015“…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. These web pages often contain semi-structured content which make the classification process challenging. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…Predictions are aggregated using a soft voting mechanism. This research utilises the web page phishing detection dataset, which consists of 11,430 URLs with 87 features. …”
Get full text
Get full text
Get full text
Article -
8
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
9
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
Get full text
Get full text
Conference or Workshop Item -
10
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…As for the result, the dataset that has gone through data annotation using self-training technique with SVM model is used for further analysis as it achieved 90.0% accuracy and F1-score. …”
Get full text
Get full text
Get full text
Article -
11
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012“…Therefore, this paper analyzed the issues and proposed a solution to manage the audio storage.The elements from biological inspired components were studied and identified to seek for the requirements of Bio-Inspired Storing Model (BiSM).Then a structural architecture of BiSM was designed in addition the Cognitive and Constructive Learning (CCL) algorithm was proposed.Finally, BiSM and CCL algorithm were evaluated with exemplar application settings and the results were presented in a case study of MP3 music collections.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Integrated ACOR/IACOMV-R-SVM Algorithm
Published 2017Get full text
Get full text
Get full text
Article -
13
-
14
-
15
-
16
-
17
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…This paper describes a new application of the Bees Algorithm to the optimization of a Support Vector Machine (SVM) for the problem of classifying defects in plywood. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…The EFDT and hybrid DT-SVM algorithms were designed and deployed based on DT and SVM algorithms to achieve improved performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Solving SVM model selection problem using ACOR and IACOR
Published 2013Get full text
Get full text
Get full text
Article -
20
An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item
