Search Results - (( web application ((tree algorithm) OR (new algorithm)) ) OR ( web applications out algorithm ))*
Search alternatives:
- web applications »
- applications out »
- web application »
- tree algorithm »
- new algorithm »
- out algorithm »
-
1
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
3
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
-
5
-
6
-
7
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
8
-
9
Registration and billing system
Published 2005“…To view the patient data and records, the bubble sort sorting algorithm has been applied.By applying this algorithm into the system prototype,the user of the system can get easily to look for the patient records in a list. …”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
An efficient fuzzy C-least median clustering algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Article -
12
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar
Published 2016“…This research is about the application of fuzzy logic algorithm in applying zakat. …”
Get full text
Get full text
Thesis -
14
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
15
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
16
-
17
-
18
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
19
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
20
