Search Results - (( using factor method algorithm ) OR ( web application method algorithm ))

Refine Results
  1. 1
  2. 2

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah by Asad, Ali Shah

    Published 2017
    “…The proposed credibility assessment algorithm uses seven categories for scoring credibility, including correctness, authority, currency, professionalism, popularity, impartiality and quality, where each category consists of one or more credibility factors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Smart Routing For Solid Waste Collection by Ngiam, John Tze

    Published 2023
    “…The algorithm will take into account factors such as the capacity and power of the truck, and the workload assigned to the crew. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    A spark-based parallel fuzzy C median algorithm for web log big data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Nizamuddin, Mohammed Khaja, Sarkar, Rashal, Chalil, Aboosalih Kakkat

    Published 2022
    “…At the moment, the situation is such that we are starved for knowledge while drowning in data. Due to these factors, the data mining clustering technique is one of the most crucial tools for collecting useful data from the web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The study findings indicate that the suggested Certainty Factor method is more suited for use in embedded systems or web-based applications, however it is constrained by low processing.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Document ranking using information quality criteria in weblog search engine by Azimzadeh, Fatemeh

    Published 2013
    “…A major problem is that a weblog includes nontraditional features of the Web pages such as Weblog post, links, tags, and comments. Thus, the use of traditional rank algorithms like PageRank and HITS in general search engines are not appropriate to evaluate the Weblog posts because such algorithms do not consider the blog specific features. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Intelligent cooperative adaptive weight ranking policy via dynamic aging based on NB and J48 classifiers by Al-Qudah,, Dua’A Mahmoud, Olanrewaju, Rashidah Funke, Azman, Amelia Wong

    Published 2017
    “…On the other hand, the conventional algorithms for replacement such as Least Recently Use (LRU), First in First Out (FIFO), Least Frequently Use (LFU), Randomised Policy, etc. may discard essential pages just before use. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…Secondly, this work designs optimization measures from inertia weight and learning factor to build an improved particle swarm optimization algorithm (IPSO). …”
    Get full text
    Get full text
    Article
  13. 13

    Text Steganography using Extensions Kashida based on the Moon and Sun Letters Concept by Shaker, AA, Farida Hazwani Mohd Ridzuan, Sakinah Ali Pitchay

    Published 2024
    “…For the Text Using Kashida Variation Algorithm method, the average embedding ratio and the average efficiency ratio are 31.61% and 27.82% respectively. …”
    Article
  14. 14

    Prototype development of Web AI-based decision support system: insights and recommendations for satellite anomaly identification by Mutholib, Abdul, Abdul Rahim, Nadirah, Gunawan, Teddy Surya

    Published 2025
    “…The contribution of this paper can be summarized as (i) outlines Web AI-based DSS for satellite anomaly identification, (ii) present comprehensive taxonomy of the Web AI-Based DSS methods applied to space situational awareness (SSA), which addresses the insight of factors leading to the loss of a satellite and its recommendation to prevent satellite failure during their operational. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Influences of Cost Factors Affecting Technical Performance of Local Government Projects in Nigeria: A Partial Least Square-Structural Equation Modeling (PLS-SEM) Approach by Gambo, Nuru, Said, Ilias, Ismail, Radzi

    Published 2016
    “…A Warp partial least square-structural equation modeling (PLS-SEM) software algorithm was used for the analysis of collected data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    How can unmanned aerial vehicles be used for detecting weeds in agricultural fields? by Mohidem, Nur Adibah, Che’Ya, Nik Norasma, Juraimi, Abdul Shukor, Fazlil Ilahi, Wan Fazilah, Mohd Roslim, Muhammad Huzaifah, Sulaiman, Nursyazyla, Saberioon, Mohammadmehdi, Mohd Noor, Nisfariza Maris

    Published 2021
    “…Most of the weed images were captured using red, green, and blue (RGB) camera, i.e., 48.28% and main classification algorithm was machine learning techniques, i.e., 47.90%. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…The created data sets are then classified using Naive-Bayes and C4.5 algorithms provided in WEKA application. The experimental results show that Naive-Bayes classifier with web text extraction algorithm proves to be the best method for web text classification.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article
  20. 20

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article