Search Results - (( web application ((svm algorithm) OR (based algorithm)) ) OR ( _ application among algorithm ))*
Search alternatives:
- application among »
- web application »
- among algorithm »
- svm algorithm »
-
1
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Competency development is carried out on this KMS by downloading lecturer competency materials as needed and conducting discussion forums among colleagues. Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
4
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
5
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
6
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
7
Classifying good and bad websites
Published 2015“…Hence, SVM classifier achieved the highest accuracy among all. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
9
Phishing image spam classification research trends: Survey and open issues
Published 2020“…This study reviews articles on phishing image spam classification published from 2006 to 2020 based on spam classification application domains, datasets, features sets, spam classification methods, and the measurement metrics adopted in the existing studies. …”
Get full text
Get full text
Article -
10
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
11
Multi-population Genetic Algorithm for Rich Vehicle Routing Problems
Published 2020“…Results from the experiments show that MPGA-RVRP performs better compared to benchmark, Multi-objective Genetic Algorithm (MOGA). A web-based logistic sys�tem has also been developed as use case for MPGA-RVRP.…”
Get full text
Get full text
Final Year Project -
12
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
Get full text
Get full text
Get full text
Article -
15
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
16
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
Get full text
Get full text
Get full text
Article -
17
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
