Search Results - (( its applications ((bayes algorithm) OR (_ algorithm)) ) OR ( web application use algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…The machine learning algorithms employed in this study encompass Convolutional Neural Networks (CNN), Logistic Regression, Naïve Bayes Classifier, Support Vector Machine, and Random Forest. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali by Mohd Razali, Farah Nabila

    Published 2025
    “…This study explores the application of sentiment analysis using the Naive Bayes algorithm to understand public perceptions of marital issues, particularly factors contributing to the rising divorce rate. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item