Search Results - (( based constructive method algorithm ) OR ( web evaluation using algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- evaluation using »
- using algorithm »
- web evaluation »
-
1
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The methodology and testing procedure which are used during this evaluation is based on a simulation model. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…The aim is to solve the above-mentioned problems via an optimization mechanism based upon the combination between runtime path prediction method and heuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A systematic review of machine learning techniques and applications in soil improvement using green materials
Published 2023“…The current study aims to comprehensively evaluate recent breakthroughs in machine learning algorithms for soil improvement using a systematic procedure known as PRISMA and meta-analysis. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The study findings indicate that the suggested Certainty Factor method is more suited for use in embedded systems or web-based applications, however it is constrained by low processing.…”
Get full text
Get full text
Get full text
Article -
5
Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi
Published 2013“…Time-series clustering is not only useful as an exploratory technique but also as a subroutine in more complex data mining algorithms. …”
Get full text
Get full text
Thesis -
6
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
7
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
Get full text
Get full text
Get full text
Thesis -
8
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
9
A new ant based rule extraction algorithm for web classification
Published 2011“…Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
10
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
11
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…The technology for Web questionnaire which have been used for survey research is still young and difficult. …”
Get full text
Get full text
Conference or Workshop Item -
12
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report -
13
Web application vulnerabilities detection model
Published 2016“…As the use of the web is increasing, the use of web application is also increasing. …”
Get full text
Get full text
Research Reports -
14
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
Get full text
Get full text
Thesis -
15
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
16
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Besides that, the research also aims to develop a prototype for Interactive Courseware using Web 2.0 by integrating Web 2.0 technologies and services and lastly to evaluate the effectiveness and the usability of the project by comparing the pre-test and post-test result and surnmative evaluation respectively. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…Moreover, cache pollution is a drawback of traditional web caching policies such as Least Frequently Used (LFU), Least Recently Used (LRU), and Greedy Dual Size (GDS) where web objects that are stored in the cache are not visited frequently. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
Get full text
Get full text
Get full text
Thesis -
20
Stemming Algorithm in Searching Malay Text
Published 2004“…This project evaluates the retrieval effectiveness of stemming algorithm in searching and retrieving relevant Malay Web pages based on user natural query words. …”
Get full text
Get full text
Get full text
Thesis
