Search Results - (( web application method algorithm ) OR ( using classification using algorithm ))

Refine Results
  1. 1

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…The experimental results show that Naive-Bayes classifier with web text extraction algorithm proves to be the best method for web text classification.…”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. Web documents contain enormous number of attributes as compared to other type of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…This research focuses on improving the prediction of the next visited web pages and introduces them to current anonymous user. An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison of attribute selection methods for web texts categorization by Saian, Rizauddin, Ku-Mahamud, Ku Ruhana

    Published 2010
    “…This paper presents a study on the performance of attribute selection methods to be used with Ant-Miner algorithm for web text categorization.The new generated data set by each attribute selection method was classified with Ant-Miner to see the performance in terms of predictive accuracy and the number of rules generated.The results of classification were also compared to C4.5 algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…This research presents a two-phase phishing detection system by employing unsupervised feature selection and supervised classification. In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Book Chapter
  9. 9

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart... by Hamza H. M. , Altarturi

    Published 2023
    “…Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  14. 14

    A systematic review of machine learning techniques and applications in soil improvement using green materials by Saad, Ahmed Hassan, Nahazanan, Haslinda, Yusuf, Badronnisa, Toha, Siti Fauziah, Alnuaim, Ahmed, El-Mouchi, Ahmed, Elseknidy, Mohamed, Mohammed, Angham Ali

    Published 2023
    “…The current study aims to comprehensively evaluate recent breakthroughs in machine learning algorithms for soil improvement using a systematic procedure known as PRISMA and meta-analysis. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Phishing image spam classification research trends: Survey and open issues by John Abari, Ovye, Mohd Sani, Nor Fazlida, Khalid, Fatimah, Mohd Yunus Bin Sharum, Mohd Yunus, Mohd Ariffin, Noor Afiza

    Published 2020
    “…This study reviews articles on phishing image spam classification published from 2006 to 2020 based on spam classification application domains, datasets, features sets, spam classification methods, and the measurement metrics adopted in the existing studies. …”
    Get full text
    Get full text
    Article
  17. 17

    Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli by Rosli, Mohamad Shafiq

    Published 2021
    “…The project aimed to implement web-based banana species recognition system. The method of the project is convolutional neural network. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Analysis On QOS Parameters To Predict Http Response by A.Rahman, Khairulnizam

    Published 2017
    “…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A systematic review of machine learning techniques and applications in soil improvement using green materials by Saad, Ahmed Hassan, Nahazanan, Haslinda, Yusuf, Badronnisa, Toha, Siti Fauziah, Alnuaim, Ahmed, El-Mouchi, Ahmed, Elseknidy, Mohamed, Mohammed, Angham Ali

    Published 2023
    “…The current study aims to comprehensively evaluate recent breakthroughs in machine learning algorithms for soil improvement using a systematic procedure known as PRISMA and meta-analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Visual codebook analysis in image understanding / Hoo Wai Lam by Hoo, Wai Lam

    Published 2015
    “…Therefore, a zero-shot learning approach is needed to classify those images that have not been seen by the classification model before. State-of-the-art approaches often used attributes as the zero-shot learning solution. …”
    Get full text
    Get full text
    Thesis