Search Results - (( web application ((need algorithm) OR (tree algorithm)) ) OR ( its application use algorithm ))*
Search alternatives:
- web application »
- its application »
- application use »
- need algorithm »
- tree algorithm »
- use algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
-
3
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
6
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
7
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
8
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
Get full text
Get full text
Conference or Workshop Item -
9
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
12
An Automated System For Classifying Conference Papers
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…Although all of the objectives had been achieved the current system restricted user to make changes on the calculated route directly, the clustering algorithm and the route optimization algorithm applied are not wise enough and several enhancements can be made for this system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018“…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
Get full text
Get full text
Conference or Workshop Item -
18
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
20
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article
