Search Results - (( _ application tools algorithm ) OR ( web application ((new algorithm) OR (tree algorithm)) ))*
Search alternatives:
- application tools »
- tools algorithm »
- web application »
- tree algorithm »
- new algorithm »
-
1
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
4
-
5
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
8
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis -
10
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
Get full text
Get full text
Get full text
Article -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
-
13
New species orchid recognition system using convolutional neural network / Annisa Atikah Mohd Fadzil and Itaza Afiani Mohtar
Published 2021“…This project is to prove that the concept of new orchid species recognition can be done. The web application that created using HTML and Flask was able to recognize new species based on existing species. …”
Get full text
Get full text
Get full text
Article -
14
DATA REPRESENTATION AND REASONING BASED ON SEMANTIC WEB INTEGRATION
Published 2015Get full text
Get full text
Thesis -
15
Registration and billing system
Published 2005“…To view the patient data and records, the bubble sort sorting algorithm has been applied.By applying this algorithm into the system prototype,the user of the system can get easily to look for the patient records in a list. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
17
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
18
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
19
Identifying Dna Sequences Of Commercialized Goat's Milk And Fresh Goat's Milk From Database via Basic Local Alignment Search Tool (Blast)
Published 2024conference output::conference proceedings::conference paper -
20
Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang
Published 2019“…In conclusion, the present work has demonstrated that cancer genomics data mining and integration through GENIPAC and DeSigN is a viable approach to accelerating the drug development process for oral cancer. Importantly, application of these two tools led to the discovery of bosutinib as a new, promising drug candidate to be repurposed for treating oral cancer in the future.…”
Get full text
Get full text
Thesis
