Search Results - (( _ application learning algorithm ) OR ( web applications need algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- applications need »
- web applications »
- need algorithm »
-
1
Bot detection using machine learning algorithms on social media platforms
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
4
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009“…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
Get full text
Get full text
Conference or Workshop Item -
5
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
Get full text
Get full text
Student Project -
6
Exploring nexus of social media algorithms, content creators, and gender bias: a systematic literature review
Published 2024“…The review synthesizes diverse theoretical approaches and models, offering comprehensive insights into the complex nexus of algorithms, gender bias, and content creators. The application of varied research methodologies, including experiments, surveys, and content analyses, facilitates a thorough examination of algorithmic impacts. …”
Get full text
Get full text
Get full text
Article -
7
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
Get full text
Get full text
Thesis -
8
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Visual codebook analysis in image understanding / Hoo Wai Lam
Published 2015Get full text
Get full text
Thesis -
10
-
11
Facial recognition attendance system
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Job-Applicant matchmaking system using natural language processing
Published 2023“…This system uses natural language processing (NLP) techniques to analyse job descriptions and candidate resumes, and machine learning algorithms to recommend the most suitable candidate to a job opening, and vice versa. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Prototype development of Web AI-based decision support system: insights and recommendations for satellite anomaly identification
Published 2025“…A detailed literature review highlights the current state of satellite anomaly identification and the application of the Web AI-based DSS in various fields. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
15
Future Trend of Artificial Intelligence and Stock Market: A Comprehensive Bibliometric Analysis
Published 2025“…Artificial intelligence (AI) has revolutionized stock market research, offering innovative solutions for predictive modeling, algorithmic trading, and financial decision-making. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Machine Learning Applications in Multiplayer Online Battle Arena Esports—A Systematic Review
Published 2025“…The applications of ML in MOBA are an interesting field of study as the esports genre is enriched by a plethora of data. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
18
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS). …”
Get full text
Get full text
Get full text
Article -
19
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
20
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis
