Search Results - (( web application tree algorithm ) OR ( some applications mining algorithm ))
Search alternatives:
- applications mining »
- some applications »
- application tree »
- mining algorithm »
- web application »
- tree algorithm »
-
1
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
2
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
4
-
5
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
6
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
7
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
8
Car dealership web application
Published 2022“…In this project, a web application and a web service were proposed and implemented. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
-
11
-
12
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
15
An association rule mining approach in predicting flood areas
Published 2017“…This study focuses on the application of Association rules mining for the flood data in Terengganu. …”
Get full text
Get full text
Conference or Workshop Item -
16
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
Get full text
Get full text
Get full text
Article -
19
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
20
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
Get full text
Get full text
Conference or Workshop Item
