Search Results - (( based application out algorithm ) OR ( web application ((new algorithm) OR (tree algorithm)) ))*
Search alternatives:
- based application »
- application out »
- web application »
- tree algorithm »
- out algorithm »
- new algorithm »
-
1
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
Get full text
Get full text
Thesis -
3
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
4
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…However, for optimum distance, dijkstra algorithm has been used. This algorithm is one of the algorithms used for getting the lowest cost search path. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
-
10
-
11
Registration and billing system
Published 2005“…To view the patient data and records, the bubble sort sorting algorithm has been applied.By applying this algorithm into the system prototype,the user of the system can get easily to look for the patient records in a list. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
13
-
14
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
15
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
16
-
17
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
18
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
19
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
20
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis
