Search Results - (( web applications _ algorithm ) OR ( web application ((svm algorithm) OR (path algorithm)) ))

Refine Results
  1. 1

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS by DELLON, NELSON BRUNNIE

    Published 2023
    “…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route by Haziq Lim, AM, Wan Sazli, NS, Hussin, B., Azlianor, A. A., Suhaizan, SM, Massila, K

    Published 2010
    “…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Malware visualizer: A web apps malware family classification with machine learning by Mohd Zamri, Osman, Ahmad Firdaus, Zainal Abidin, Rahiwan Nazar, Romli

    Published 2021
    “…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A malicious URLs detection system using optimization and machine learning classifiers by Lee, Ong Vienna, Heryanto, Ahmad, Mohd Faizal, Ab Razak, Anis Farihan, Mat Raffei, Eh Phon, Danakorn Nincarean, Shahreen, Kasim, Sutikno, Tole

    Published 2020
    “…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimization of LRT Route for Mobile Web Application Engine by Lim, A. M. H., Sazli, N. S. W., Hussin, B., Azlianor, A. A., Suhaizan, S. M., Massila, K.

    Published 2009
    “…In previous research we already implement the mobile web application architecture where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Mobile Web Application Engine for Generating Destination-oriented LRT Route by Abdullah, Muhammad Haziq Lim, Saifudin, Wan Sazli Nasaruddin, Hussin, Burairah, Abdul-Aziz, Azlianor, Sulong, Muhammad Suhaizan, Kamalrudin, Massila

    Published 2009
    “…In previous research we already implement the mobile web application architecture where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Classifying good and bad websites by Koo, Ee Woon

    Published 2015
    “…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. These web pages often contain semi-structured content which make the classification process challenging. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  17. 17

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20