Search Results - (( web application ((tree algorithm) OR (bat algorithm)) ) OR ( its location based algorithm ))*
Search alternatives:
- web application »
- tree algorithm »
- bat algorithm »
- its location »
-
1
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
4
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
5
-
6
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
7
Car dealership web application
Published 2022“…In this project, a web application and a web service were proposed and implemented. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
11
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
12
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
-
16
Autonomous path planning robot using geographical information
Published 2008“…The guidance algorithm is formed based on an initial direction and distance of the target location without considering the time taken by the robot to reach the desired destination. …”
Get full text
Learning Object -
17
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
19
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
20
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
Get full text
Get full text
Thesis
