Search Results - (( its application a algorithm ) OR ( web application ((svm algorithm) OR (path algorithm)) ))
Search alternatives:
- its application »
- web application »
- path algorithm »
- application a »
- svm algorithm »
- a algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…The algorithm searches in a weighted directed network to find the shortest path from a given node to every other node in the network. …”
Get full text
Get full text
Thesis -
3
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. A web-based traffic management system was developed using open source software in this study. …”
Get full text
Get full text
Thesis -
4
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
5
-
6
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…In order to protect a web application from a malicious user, test procedures for identifying and removing SQLIVs must be implemented earlier in the software development life cycle (SDLC) of web applications, specifically before bringing it onto production and possibly becoming available to a malicious attack. …”
Get full text
Get full text
Thesis -
9
-
10
A review of slicing techniques in software engineering
Published 2015“…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Classifying good and bad websites
Published 2015“…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. These web pages often contain semi-structured content which make the classification process challenging. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route
Published 2010“…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Article -
18
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. …”
Get full text
Get full text
Get full text
Article -
19
Optimization of LRT Route for Mobile Web Application Engine
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A Mobile Web Application Engine for Generating Destination-oriented LRT Route
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
