Search Results - (( its application ((acs algorithm) OR (_ algorithm)) ) OR ( web application learning algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- its application »
- web application »
- acs algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…The system is able to update the information from the database provided that the administrator monitors its activities periodically. This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
5
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
6
-
7
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…By integrating the Google Safe Browsing List and the Random Forest classifier, a web application is created. Upon receiving the user's URL, the web application utilises a pre-trained Random Forest classifier to ascertain the probability that the requested URL is a fraud site. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Modified ACS centroid memory for data clustering
Published 2019“…Ant Colony Optimization (ACO) is a generic algorithm, which has been widely used in different application domains due to its simplicity and adaptiveness to different optimization problems. …”
Get full text
Get full text
Get full text
Article -
11
Embedding Malaysian House Red Ant Behavior into an Ant Colony System
Published 2008Get full text
Get full text
Citation Index Journal -
12
An improved ACS algorithm for data clustering
Published 2020Get full text
Get full text
Get full text
Article -
13
Strategies DACS3 Increasing its Performances
Published 2009Get full text
Get full text
Citation Index Journal -
14
New species orchid recognition system using convolutional neural network / Annisa Atikah Mohd Fadzil and Itaza Afiani Mohtar
Published 2021“…The web application that created using HTML and Flask was able to recognize new species based on existing species. …”
Get full text
Get full text
Get full text
Article -
15
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…We discuss matrix-multiplication algorithm and highlight one of the parallel matrix--multiplication algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article
