Search Results - (( web location model algorithm ) OR ( _ application ((mead algorithm) OR (based algorithm)) ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  9. 9

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. Model based slicing split the large architectures of software into smaller sub models during early stages of SDLC. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…The proposed system is developed in the web-based platform, so that it can be accessed anytime, anywhere regardless of the geographical location.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Brain tumor image segmentation using deep learning approach by Darshan, Suresh

    Published 2022
    “…The proposed model is also deployed as a web application using Flask for public usage. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Modelling COVID-19 Hotspot Using Bipartite Network Approach by Hong, Boon Hao, Labadin, Jane, Tiong, Wei King, Lim, Terrin, Chung, Melvin Hsien Liang

    Published 2021
    “…The summation rule is applied to quantify all nodes in the network and the link weight between the human node and the location node. The ranking of location and human nodes in this network is computed using a web search algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20