Search Results - (( web application tree algorithm ) OR ( some applications ((need algorithm) OR (_ algorithm)) ))
Search alternatives:
- some applications »
- application tree »
- web application »
- tree algorithm »
- need algorithm »
-
1
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
3
-
4
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
7
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…The effectiveness of a treatment depends on the type of the skin disorder, as some disorders can be easily managed by creams and ointments and some need long-term treatments. …”
Get full text
Get full text
Final Year Project -
8
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
9
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
10
Iterative methods for solving split common fixed point problems in Hilbert spaces
Published 2016“…Our interest here is to apply these mappings to propose some algorithms for solving split common fixed point problems and its variant forms, in the end, we prove the convergence results of these algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
HISEC: a new lightweight block cipher algorithm
Published 2014“…Lightweight block cipher algorithms are vital for constrained environment. There are many applications need secured lightweight block cipher algorithm like credit card, E-passport and etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Deploying blockchains to simplify AI algorithm auditing
Published 2023“…A huge number of business companies have incorporated several machine learning algorithms for day-to-day decision making. With increasing applications of AI algorithms, the concerns regarding its outcomes have also increased due to bias. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
14
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
15
Enhancing solid oxide fuel cell efficiency through advanced model identification using differential evolutionary mutation fennec fox algorithm
Published 2025“…The computational time of the proposed algorithm is 1.001 s, followed by the parent algorithm FFA (1.199 s) and some of the compared algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
Get full text
Get full text
Proceeding Paper -
17
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
18
-
19
On density-based data streams clustering algorithms: A survey
Published 2017“…The purpose of this paper is to shed light on some algorithms in the literature on density-based clustering over data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
