Search Results - (( web application svm algorithm ) OR ( _ application among algorithm ))*
Search alternatives:
- application among »
- web application »
- application svm »
- among algorithm »
- svm algorithm »
-
1
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Competency development is carried out on this KMS by downloading lecturer competency materials as needed and conducting discussion forums among colleagues. Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Classifying good and bad websites
Published 2015“…Hence, SVM classifier achieved the highest accuracy among all. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
4
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Phishing image spam classification research trends: Survey and open issues
Published 2020“…More than 50 articles, both from Web of Science and Scopus databases were picked. …”
Get full text
Get full text
Article -
6
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. …”
Get full text
Get full text
Get full text
Article -
9
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
10
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
Get full text
Get full text
Get full text
Article -
11
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
15
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
Get full text
Get full text
Get full text
Article -
16
Voting algorithms for large scale fault-tolerant systems
Published 2011“…In these systems, voting algorithms are extensively employed to arbitrate among the results of N redundant hardware modules or software versions. …”
Get full text
Get full text
Thesis -
17
The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki
Published 2021“…However, the problems that occur to practice the Faraid among Muslim is the beneficiaries do not really understand the concept of Faraid that may lead to misunderstanding about Faraid distribution and have narrowed its application that will make it unworkable. …”
Get full text
Get full text
Student Project -
18
Adaptive load balancing algorithm for wireless distributed computing networks
Published 2016“…Herein, the validity of the proposed novel ALB algorithm is proved first. Then, ALB algorithm is applied to an application in cognitive radio network (CRN). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
Get full text
Get full text
Thesis -
20
CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Media
Published 2022“…Algorithmic problems form the core of computer science, and thus algorithm design and analysis is among its most fundamental elements. …”
Get full text
Get full text
Get full text
Teaching Resource
