Search Results - (( web application model algorithm ) OR ( its location based algorithm ))

Refine Results
  1. 1

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  2. 2

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. Model based slicing split the large architectures of software into smaller sub models during early stages of SDLC. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…The proposed system is developed in the web-based platform, so that it can be accessed anytime, anywhere regardless of the geographical location.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…The web service performed model explaining and monitoring by querying the application data from the Azure SQL Database. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Finally, the model was pickled and loaded into the web application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…The guidance algorithm is formed based on an initial direction and distance of the target location without considering the time taken by the robot to reach the desired destination. …”
    Get full text
    Learning Object
  13. 13

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
    Get full text
    Get full text
    Article