Search Results - (( model application _ algorithm ) OR ( web application out algorithm ))*
Search alternatives:
- model application »
- web application »
- application out »
- out algorithm »
-
1
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
2
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
3
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…The binary image of the extracted characters was fed to the CNN model for classification. In addition, a simple web application connected to Jupyter Notebook has been developed to perform the testing. …”
Get full text
Get full text
Student Project -
4
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
-
6
A Web Based System For Evaluating Occupational Stress
Published 2007Get full text
Get full text
Get full text
Article -
7
Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.]
Published 2022“…Content-based recommendation algorithm is implemented into the system as it can recommend the best skill content suitable for a job application. …”
Get full text
Get full text
Get full text
Book Section -
8
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
9
-
10
Virtual GIS walkthrough Innovation Center / Mohd Sufean Abu Samah
Published 1999“…A standard called VRML (Virtual Reality Modeling Language) and Caligari Truespace 3.0 has been developed to enable virtual reality application to be implemented on the web. …”
Get full text
Get full text
Thesis -
11
A review of slicing techniques in software engineering
Published 2015“…A common practice now is to extract the sub models out of the giant models based upon the slicing criteria. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
16
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Phishing image spam classification research trends: Survey and open issues
Published 2020“…We compared the performance of the state-of-the-art image spam models. Lastly, we pointed out promising directions for future research.…”
Get full text
Get full text
Article -
18
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
