Search Results - (( web application tree algorithm ) OR ( its applications ((out algorithm) OR (_ algorithm)) ))
Search alternatives:
- application tree »
- its applications »
- web application »
- tree algorithm »
- out algorithm »
-
1
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
2
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
Get full text
Get full text
Get full text
Academic Exercise -
3
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
4
-
5
An Automated System For Classifying Conference Papers
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
8
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
9
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
Get full text
Get full text
Thesis -
10
-
11
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
Get full text
Get full text
Get full text
Article -
12
Optimal power flow using the Jaya algorithm
Published 2016“…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
14
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper -
15
-
16
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012Get full text
Get full text
Conference or Workshop Item -
17
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
18
Development of symbolic algorithms for certain algebraic processes
Published 2007“…For more definitive conclusions, the computing time functions of the algorithms that are presented in this report have been worked out. …”
Get full text
Get full text
Get full text
Monograph -
19
DC motor control using LQR algorithm
Published 2008“…An application in Matlab called Simulink is used as tools for algorithm implementation. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Development of symbolic algorithms for certain algebraic processes
Published 2007“…For more definitive conclusions, the computing time functions of the algorithms that are presented in this report have been worked out. …”
Get full text
Get full text
Get full text
Monograph
