Search Results - (( based application ((a algorithm) OR (new algorithm)) ) OR ( web application svm algorithm ))
Search alternatives:
- based application »
- web application »
- application svm »
- new algorithm »
- svm algorithm »
- a algorithm »
-
1
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
2
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
4
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
Get full text
Get full text
Conference or Workshop Item -
6
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
9
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
10
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
Published 2018“…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
Get full text
Get full text
Get full text
Article -
11
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…It is a new approach which performs core operation using multiplication of points based in ECC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…A new case is retained in the case base for future retrievals. …”
Conference paper -
15
-
16
-
17
-
18
DYNAMIC PRICING ALGORITHM IN PARKING SYSTEMS
Published 2020Get full text
Get full text
Final Year Project -
19
-
20
A new fair marker algorithm for DiffServ networks
Published 2008“…The proposed algorithm is based on the adaptability concept of changing the constant value in the previous version of the algorithm (ItswTCM), in other words, changing the limit for the constant value without affecting the simplicity of the algorithm. …”
Get full text
Get full text
Article
