Search Results - (( _ application a algorithm ) OR ( web application svm algorithm ))*
Search alternatives:
- web application »
- application svm »
- application a »
- svm algorithm »
- a algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…In the second phase, the best set of features in each group is identified through the Genetic algorithm to enhance the classification process. Finally, a voting ensemble technique is applied, in which the Support Vector Machine (SVM), Random Forest (RF), Extreme Gradient Boosting (XGBoost) and Adaptive boosting (AdaBoost) models are combined. …”
Get full text
Get full text
Get full text
Article -
6
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
Get full text
Get full text
Get full text
Article -
7
Classifying good and bad websites
Published 2015“…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
Get full text
Get full text
Conference or Workshop Item -
9
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
10
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Phishing image spam classification research trends: Survey and open issues
Published 2020“…A phishing email is an attack that focused completely on people to circumvent existing traditional security algorithms. …”
Get full text
Get full text
Article -
13
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…Greedy algorithms expresses as a simple solution algorithm that choose a local optimum solution at each step to achieve a global optimum. …”
Get full text
Get full text
Get full text
Article -
14
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…This paper presents a novel technique consisting of both TOPSIS and game theory algorithms to study three smart grid applications. …”
Get full text
Get full text
Get full text
Article -
15
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…The application involves the reduction of a traffic noise that affects the pressure field in a bedroom. …”
Get full text
Get full text
Thesis -
18
Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review
Published 2022“…A detailed description of different spiral paths, their characteristics, and the application of these spiral approaches in developing and improving other optimization algorithms are comprehensively presented. …”
Get full text
Get full text
Article -
19
Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review
Published 2022“…A detailed description of different spiral paths, their characteristics, and the application of these spiral approaches in developing and improving other optimization algorithms are comprehensively presented. …”
Get full text
Get full text
Article -
20
Comprehensive review of the development of the harmony search algorithm and its applications
Published 2019“…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. …”
Get full text
Get full text
Get full text
Article
