Search Results - (( based application ((a algorithm) OR (new algorithm)) ) OR ( web application svm algorithm ))

Refine Results
  1. 1

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  2. 2

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS by DELLON, NELSON BRUNNIE

    Published 2023
    “…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Malware visualizer: A web apps malware family classification with machine learning by Mohd Zamri, Osman, Ahmad Firdaus, Zainal Abidin, Rahiwan Nazar, Romli

    Published 2021
    “…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A malicious URLs detection system using optimization and machine learning classifiers by Lee, Ong Vienna, Heryanto, Ahmad, Mohd Faizal, Ab Razak, Anis Farihan, Mat Raffei, Eh Phon, Danakorn Nincarean, Shahreen, Kasim, Sutikno, Tole

    Published 2020
    “…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Propose a New Machine Learning Algorithm based on Cancer Diagnosis by Ali, Mohammed Hasan, Kohbalan, Moorthy, Anad, Mohammed Morad, Mohammed, Mohammed Abdulameer

    Published 2018
    “…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…A new case is retained in the case base for future retrievals. …”
    Conference paper
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…The proposed algorithm is based on the adaptability concept of changing the constant value in the previous version of the algorithm (ItswTCM), in other words, changing the limit for the constant value without affecting the simplicity of the algorithm. …”
    Get full text
    Get full text
    Article