Search Results - (( web application learning algorithm ) OR ( its application based algorithm ))*

Refine Results
  1. 1

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…The system is able to update the information from the database provided that the administrator monitors its activities periodically. This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  3. 3

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  4. 4

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  5. 5
  6. 6

    New species orchid recognition system using convolutional neural network / Annisa Atikah Mohd Fadzil and Itaza Afiani Mohtar by Mohd Fadzil, Annisa Atikah, Mohtar, Itaza Afiani

    Published 2021
    “…The web application that created using HTML and Flask was able to recognize new species based on existing species. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
    Get full text
    Get full text
    Article
  8. 8

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Fakebuster: fake news detection system using logistic regression technique in machine learning by Mokhtar, Muhammad Syahmi, Jusoh, Yusmadi Yah, Admodisastro, Novia, Che Pa, Noraini, Amruddin, Amru Yusrin

    Published 2019
    “…This model is then integrated with web service that accepts input either news URL or news content in text which is then checked for its truth level through “FAKEBUSTER” application.…”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Prototype development of Web AI-based decision support system: insights and recommendations for satellite anomaly identification by Mutholib, Abdul, Abdul Rahim, Nadirah, Gunawan, Teddy Surya

    Published 2025
    “…A detailed literature review highlights the current state of satellite anomaly identification and the application of the Web AI-based DSS in various fields. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…E-Learning is one of the Web based application where it will facing with large amount of data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart... by Hamza H. M. , Altarturi

    Published 2023
    “…Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Lower Form Grade System (LF-Grade Sys) / Norhanisha Yusof ... [et al.] by Yusof, Norhanisha, A. Sanggar, Logineey, Kalidason, Tiivashkkar, Saravanan, Puvithra

    Published 2023
    “…The algorithms of the system will automatically calculate and conclude the assessment based on the grading. …”
    Get full text
    Get full text
    Book Section
  17. 17

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…Ever since its introduction into the database community, skyline queries have been widely adopted in a range of contemporary database applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
    Get full text
    Get full text
    Get full text
    Article