Search Results - (( web application svm algorithm ) OR ( its application among algorithm ))*
Search alternatives:
- application among »
- web application »
- application svm »
- its application »
- among algorithm »
- svm algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Classifying good and bad websites
Published 2015“…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. These web pages often contain semi-structured content which make the classification process challenging. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
Get full text
Get full text
Conference or Workshop Item -
7
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. …”
Get full text
Get full text
Get full text
Article -
8
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
9
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
Get full text
Get full text
Get full text
Article -
10
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
14
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
Get full text
Get full text
Thesis -
15
CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Media
Published 2022“…Algorithmic problems form the core of computer science, and thus algorithm design and analysis is among its most fundamental elements. …”
Get full text
Get full text
Get full text
Teaching Resource -
16
CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Mathematics
Published 2018“…Algorithmic problems form the core of computer science, and thus algorithm design and analysis is among its most fundamental elements. …”
Get full text
Get full text
Get full text
Teaching Resource -
17
The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki
Published 2021“…However, the problems that occur to practice the Faraid among Muslim is the beneficiaries do not really understand the concept of Faraid that may lead to misunderstanding about Faraid distribution and have narrowed its application that will make it unworkable. …”
Get full text
Get full text
Student Project -
18
Phishing image spam classification research trends: Survey and open issues
Published 2020“…More than 50 articles, both from Web of Science and Scopus databases were picked. …”
Get full text
Get full text
Article -
19
Review of the grey wolf optimization algorithm: variants and applications
Published 2023“…The GWO algorithm offers several significant benefits, including simple implementation, rapid convergence, and superior convergence outcomes, leading to its effective application in diverse fields for solving optimization issues. …”
Get full text
Get full text
Article -
20
A review of YOLO algorithm and its applications in autonomous driving object detection
Published 2025“…This paper reviews the YOLO algorithm and its application in object detection in autonomous driving scenarios. …”
Get full text
Get full text
Get full text
Article
