Search Results - (( its application a algorithm ) OR ( web application ((svm algorithm) OR (path algorithm)) ))

Refine Results
  1. 1
  2. 2

    Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim by Lukman Hakim, Mohamad Aliff Hakimi

    Published 2017
    “…The algorithm searches in a weighted directed network to find the shortest path from a given node to every other node in the network. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. A web-based traffic management system was developed using open source software in this study. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…In order to protect a web application from a malicious user, test procedures for identifying and removing SQLIVs must be implemented earlier in the software development life cycle (SDLC) of web applications, specifically before bringing it onto production and possibly becoming available to a malicious attack. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS by DELLON, NELSON BRUNNIE

    Published 2023
    “…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Classifying good and bad websites by Koo, Ee Woon

    Published 2015
    “…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. These web pages often contain semi-structured content which make the classification process challenging. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Malware visualizer: A web apps malware family classification with machine learning by Mohd Zamri, Osman, Ahmad Firdaus, Zainal Abidin, Rahiwan Nazar, Romli

    Published 2021
    “…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route by Haziq Lim, AM, Wan Sazli, NS, Hussin, B., Azlianor, A. A., Suhaizan, SM, Massila, K

    Published 2010
    “…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Optimization of LRT Route for Mobile Web Application Engine by Lim, A. M. H., Sazli, N. S. W., Hussin, B., Azlianor, A. A., Suhaizan, S. M., Massila, K.

    Published 2009
    “…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Mobile Web Application Engine for Generating Destination-oriented LRT Route by Abdullah, Muhammad Haziq Lim, Saifudin, Wan Sazli Nasaruddin, Hussin, Burairah, Abdul-Aziz, Azlianor, Sulong, Muhammad Suhaizan, Kamalrudin, Massila

    Published 2009
    “…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item