Search Results - (( _ application model algorithm ) OR ( web application learning algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- application model »
- model algorithm »
- web application »
-
1
Cyberbullying detection: a machine learning approach
Published 2022“…Finally, the model was pickled and loaded into the web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Car dealership web application
Published 2022“…The web service performed model explaining and monitoring by querying the application data from the Azure SQL Database. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar...
Published 2022“…The object detection machine learning model used in this project is Single Shot Detector (SSD) algorithm. …”
Get full text
Get full text
Get full text
Book Section -
4
Fake news detection: A machine learning approach
Published 2021“…Finally, a web application was developed to deploy the trained model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Brain tumor image segmentation using deep learning approach
Published 2022“…The proposed model is also deployed as a web application using Flask for public usage. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
7
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
10
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
Get full text
Get full text
Get full text
Article -
12
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009“…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
Get full text
Get full text
Conference or Workshop Item -
13
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…The binary image of the extracted characters was fed to the CNN model for classification. In addition, a simple web application connected to Jupyter Notebook has been developed to perform the testing. …”
Get full text
Get full text
Student Project -
14
-
15
-
16
Stock price monitoring system
Published 2024“…Lastly, the expected outcome of this project is to have a web application to be built on Streamlit, that incorporates the deep learning model of stock price prediction and displays a dashboard with stock price insights. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Exploring nexus of social media algorithms, content creators, and gender bias: a systematic literature review
Published 2024“…The application of varied research methodologies, including experiments, surveys, and content analyses, facilitates a thorough examination of algorithmic impacts. …”
Get full text
Get full text
Get full text
Article -
19
-
20
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…As proven by the obtained results, integrating feature selection with ensemble learning is effective for phishing detection; moreover, the scalability and efficiency of such a solution in real-world applications are demonstrated.…”
Get full text
Get full text
Get full text
Article
