Search Results - (( using vector method algorithm ) OR ( web application method algorithm ))
Search alternatives:
- method algorithm »
- web application »
- vector method »
-
1
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
2
Web service applications and consumer environments based on ICT-driven optimization
Published 2022“…In the field of web service application and consumer environment optimization, it has been shown that the introduction of network embedding methods can effectively alleviate the problems such as data sparsity in the recommendation process. …”
Get full text
Get full text
Article -
3
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
4
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Handwriting recognition using webcam for data entry
Published 2014“…Several distinctive feature from each character is extracted using a few feature extraction methods, in which a comparison between three types of feature extraction modules were used. …”
Get full text
Get full text
Final Year Project -
6
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…Predictions are aggregated using a soft voting mechanism. This research utilises the web page phishing detection dataset, which consists of 11,430 URLs with 87 features. …”
Get full text
Get full text
Get full text
Article -
7
Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli
Published 2021“…The project aimed to implement web-based banana species recognition system. The method of the project is convolutional neural network. …”
Get full text
Get full text
Thesis -
8
Sequential pattern mining using personalized minimum support threshold with minimum items
Published 2011“…The P_minsup is generated for each k-sequence by analyzing the overall support pattern distribution of the click stream data; while the min_i value gives the user the flexibility to gain control on the number of patterns to be generated on the next k-sequence by using the top min_i items. This approach is then applied in the SPADE Algorithm using vector array as an extension from the previous method of using relational database and pre-defined threshold.The result from this experiment demonstrates that P_minsup with the complement of min_i value approach is applicable in assisting the process of determining the suitable threshold value to be used in detecting users' frequent k-sequential topics in navigating the World Wide Web (WWW).…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Customer sentiment analysis through social media feedback
Published 2022“…The data were then split into training and testing to be tested on the three different supervised learning algorithms used in this study which are Support Vector Machine, Random Forest, and Naïve Bayes. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Speed control analysis of brushless DC motor based on maximum amplitude DC current feedback
Published 2014“…This technique is performed with Proportional Integral (PI) control algorithm and triangular carrier comparison method to generate Pulse Width Modulation (PWM) signal. …”
Get full text
Get full text
Get full text
Article -
11
Phishing image spam classification research trends: Survey and open issues
Published 2020“…Among these methods, the most commonly utilized is the Support Vector Machine (SVM) which falls under supervised machine learning. …”
Get full text
Get full text
Article -
12
Improving malicious detection rate for Facebook application in OSN platform
Published 2018“…Therefore, to identify malicious apps, we ask the question: given a Facebook application, can we determine if it is malicious? Our key contribution in this part is in developing malware detection in Facebook third party application by using Naïve Bayes algorithm technique .We identify a set of features that help us distinguish malicious apps from benign ones. …”
Get full text
Get full text
Thesis -
13
-
14
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…For example, in video compression, the use of motion vectors on individual macro-blocks optimized the motion vector information. …”
Get full text
Get full text
Get full text
Book Chapter -
15
-
16
-
17
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…The eigenfaces is projected onto human faces to identify the features vector. These significant features vector are further refine using Gaussian kernel. …”
Get full text
Get full text
Undergraduates Project Papers -
18
An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system
Published 2011“…This paper proposes a new method to trace the transmission loss in deregulated power system by applying Genetic Algorithm (GA) and Least Squares Support Vector Machine (LS-SVM). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
The influence of sentiments in digital currency prediction using hybrid sentiment-based Support Vector Machine with Whale Optimization Algorithm (SVMWOA)
Published 2021“…Support Vector Machine (SVM) technique is used with the Whale Optimization Algorithm (WOA) which is inspired by the swarm optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper
