Science topic

HTML - Science topic

Explore the latest publications in HTML, and find HTML experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to HTML (10,000)
Sorted by most recent
Article
Full-text available
An interactive chatbot enabled service for result information system was built in response to the challenges students had dealing with the existing result information system for students' retrieval. The proposed system was created using a natural language processing model, CSS and Tailwind for graphical design, HTML for page alignment, and the flas...
Conference Paper
Full-text available
When it comes to information, the internet is a gold mine. Whether you need data for your business, school, or personal use, you may uncover a wealth of information by performing an internet search. Web Scraping (WS) is a computerized method of obtaining big amounts of information from internet sites. The bulk of this information is in the form of...
Experiment Findings
Full-text available
A system is an orderly grouping of interdependent components linked together according to a plan to achieve a specific goal; however, system automation is implemented by a generally electronic device, i.e., a digital computer, to model and simulate a system, which allows the system to achieve its specific goal more accurately and efficiently, reduc...
Article
Full-text available
The speed of earthquake emergency web document data cleaning is one of the key factors affecting emergency rescue decision-making. Data classification is the core process of data cleaning, and the efficiency of data classification determines the speed of data cleaning. This article is based on earthquake emergency Web document data and HTML structu...
Preprint
Full-text available
This paper presents the classification of phishing URL's apart from legitimate URL's with the use of machine learning and deep learning techniques. Phishing is defined as an act to steal the private information by pretending to be a legitimate entity which they are not. Machine learning model, Random Forest classifier is trained on the extracted fe...
Preprint
Full-text available
HELM Learning (Helping Everyone Learn More) is the first online peer-to-peer learning platform which allows students (typically middle-to-high school students) to teach classes and students (typically elementary-to-middle school students) to learn from classes for free. This method of class structure (peer-to-peer learning) has been proven effectiv...
Conference Paper
Full-text available
The paper explores the possibility to employ the source code of corporate websites as an information source for research in innovation studies. Research in this area is generally based on studies that collect data on patents or official data sources. Our paper links the standard economic information of the firm with web-based data and joins the ong...
Chapter
Full-text available
In state-of-the-art approaches, requirements are gradually encoded into the model, with each modeling step being verified. Once the modeling and verification process has finished, code generation is usually applied to generate the final product. Finally, the generated code is validated, e.g., by executing tests, or running simulations. At this poin...
Article
Full-text available
Penelitian ini bertujuan untuk merancang dan membangun sistem informasi penjualan berbasis web di Toko Istana Marmer Pekanbaru. Sistem pemasaran dan transaksi jual beli masih dilakukan dengan cara manual yaitu konsumen mengunjungi toko, kemudian staf penjualan melayani konsumen, konsumen melihat barang, mengecek harga barang, kemudian memilih baran...
Article
Full-text available
p>In this article, the abstract has been revised such that “30% of the total CO<sub>2</sub> increase in the atmosphere since the Industrial Revolution” now reads “30% of the total CO<sub>2</sub> increase in the atmosphere, or 14% of total emissions, since the Industrial Revolution.” In addition, the second paragraph in the “Priority areas for resto...
Preprint
Full-text available
Extracting structured information from HTML documents is a long-studied problem with a broad range of applications, including knowledge base construction, faceted search, and personalized recommendation. Prior works rely on a few human-labeled web pages from each target website or thousands of human-labeled web pages from some seed websites to trai...
Preprint
Full-text available
langevitour displays interactive animated 2D projections of high-dimensional datasets. Langevin Dynamics is used to produce a smooth path of projections. Projections are initially explored at random. A "guide" can be activated to look for an informative projection, or variables can be manually positioned. After a projection of particular interest h...
Article
Full-text available
Following publication of the original article [1], it was reported that the PDF versions of Fig. 1 and Fig. 2 were incorrect and therefore did not match the correct, HTML versions due to a typesetting error. The PDF version of the original article [1] has been updated.
Article
Full-text available
(1) Background: Due to advantages such as avoidance of chipping, pulp-friendly tooth preparation and cost reduction, zirconia is increasingly being used monolithically without veneering. Nevertheless, to enable good aesthetics, various multilayer systems have been developed. The aim of this study was to investigate the impact of different zirconia...
Article
Full-text available
The web has become a fundamental tool for carrying out many activities spanning from education to work and private life. For this reason, it must be accessible to every user regardless of any form of impairment or disability. Images on the web are a primary means for communicating information, and specific HTML elements were defined to enrich image...
Article
Full-text available
Although Scratch is the most widely used block-based educational programming language, it is not easy for students to create various types of Scratch programs based on real-life data because it does not provide web scraping capabilities. In this paper, we present novel Scratch blocks for web scraping. Using these blocks, students can not only scrap...
Preprint
Full-text available
Linked-read sequencing technologies offering reads with both high base quality and long-range DNA connectedness have shown great success in genomic studies. The mainstream platforms include 10x Genomics linked-read (10x), Single Tube Long Fragment Read (stLFR) and Transposase Enzyme-Linked Long-read Sequencing (TELL-Seq). The existing data analysis...
Book
Full-text available
Minimalist Data Wrangling with Python is envisaged as a student's first introduction to data science, providing a high-level overview as well as discussing key concepts in detail. We explore methods for cleaning data gathered from different sources, transforming, selecting, and extracting features, performing exploratory data analysis and dimension...
Article
Full-text available
This is a Letter to the Editor and does not have an abstract. Please download the PDF or view the article HTML.
Article
Full-text available
This is an Editorial and does not have an abstract. Please download the PDF or view the article HTML.
Article
Full-text available
The topic that we have selected is called "Crypto-Tracker" which we have developed using CSS, HTML and JavaScript. It is a browser extension that shows the values of top 10 cryptocurrencies in real time. Every time when the extension is clicked, the values gets updated. The target browser for this application is 'Google Chrome'. The application is...
Book
Full-text available
Introduktion till HTML och CSS är avsedd att snabbt ge den kunskap som krävs för att utveckla webbsidor. Boken har mängder med exempel och övningar varvat med utförliga teoretiska delar. Den kan användas både för studier i ämnet eller som kurslitteratur vid högskola, yrkeshögskola eller i gymnasieskolan. Den fungerar också utmärkt som referens för...
Article
Full-text available
The use of Internet for searching the information to cooking in kitchen is increasing. Slowly, it is becoming the essential item in our daily life. One of the most active areas of Artificial Intelligence (AI) research is natural language processing (NLP). Numerous NLP technologies, including chatbots, and sentiment analysis software, increase produ...
Conference Paper
Full-text available
In this modern era, santri-like modern society in general-cannot turn away from two realities of life: actual reality and virtual reality. santri are demanded to be able to adapt in order to face these two realities. The first reality requires students to have the competence to read and understand the book well for later to be applied to real life,...
Article
Full-text available
The k-nearest neighbors (KNN) algorithm is a non-parametric supervised machine learning classifier; which uses proximity and similarity to make classifications or predictions about the grouping of an individual data point. This ability makes the KNN algorithm ideal for classifying datasets of geological variables and parameters prior to 3D visualiz...
Article
Full-text available
يهدف هذا البحث الى بيان أثار اإلنتقال من النظام اليدوي التقليدي لعملية التحاسب الضريبي الى النظام اإللكتروني من خالل تفعيل الية الرقم الضريبي اإللكتروني لما لهذا التحول من تأثير على تسهيل عملية التحاسب الضريبي، والحد من مخالفات التزوير الضريبي وبالتالي زيادة الحصيلة الضريبية.وإلثبات فرضية البحث تم تصميم نظام إلكتروني باإلعتماد على تقريرضريبة الدخل...
Article
Full-text available
Flood risk management is used to monitor floodwater and mitigate flooding that impacts people, properties and infrastructures, and the environment. This study developed an interactive web-based “flood tool” for Awash and Omo-Gibe basins in Ethiopia to improve the flood monitoring services and facilities. The data used were real-time and seasonal ra...
Conference Paper
Full-text available
WebAudio Modules 2.0 (aka WAM) is a standard for developing interoperable host and plugins. that can be written using different development approaches (JavaScript, build systems, TypeScript, FAUST, Csound, front-end frameworks, etc.). In addition, the WAM standard includes the notion of group of plugins, in order for example to send MIDI events to...
Article
Full-text available
Objectives: The present study aims to survey the reaction of Web search engines to the markup metadata records of a person entity (fourteen infallibles) based on Schema.org at two levels of indexability and semantic visibility. Methods: The research method is experimental. The research populations consisted of 42 metadata records in the form of two...
Article
Full-text available
Uranium (U) is a naturally occurring, radioactive, toxic trace element that poses severe risks to public and environmental health. Depleted uranium (DU) is widely used in military munitions, including penetrators. Our previous studies showed that in arid landscapes, water-soluble U released from corroded DU penetrators that were buried underground...
Article
Full-text available
Chat rooms becoming a part of human life, from sharing and exchanging information such as texts, pictures and messages. Many begin to share the latest news and images related to news in the media field as well as chat messaging in the Internet and targeting customers in business, jokes, music and video in the entertainment field. In this paper a ch...
Article
Full-text available
The FAIR data principles are rapidly becoming a standard through which to assess responsible and reproducible research. In contrast to the requirements associated with the Interoperability principle, the requirements associated with the Accessibility principle are often assumed to be relatively straightforward to implement. Indeed, a variety of dif...
Article
Full-text available
This is a Shot Communication and does not have an abstract. Please download the PDF or view the article HTML.
Article
Full-text available
This is a Short Communication and does not have an abstract. Please download the PDF or view the article HTML.
Conference Paper
Full-text available
XML documents on the web are often found without DTDs, particularly when these documents have been created from legacy HTML. Yet having knowledge of the DTD can be valuable in querying and manipulating such documents. Recent work (cf. [1]) has given us a means to (re-)construct a DTD to describe the structure common to given set of document instanc...
Conference Paper
Full-text available
To adapt to a constantly evolving landscape of cyber threats, organizations actively need to collect Indicators of Compromise (IOCs), i.e., forensic artifacts that signal that a host or network might have been compromised. IOCs are used to gain visibility into the fast-evolving threat landscape, timely identify early signs of attacks, and develop a...
Presentation
Full-text available
Presentación en Congreso. En la presente propuesta se hace un planteamiento didáctico enfocado a la utilización de las TICs en las aulas universitarias. Se trata de una experiencia docente desarrollada en la asignatura Tecnología de los nuevos medios audiovisuales enmarcada en la titulación de Comunicación Audiovisual de la Universidad de Sevilla...
Preprint
Full-text available
Accessing daily news content still remains a big challenge for people with print-impairment including blind and low-vision due to opacity of printed content and hindrance from online sources. In this paper, we present our approach for digitization of print newspaper into an accessible file format such as HTML. We use an ensemble of instance segment...
Article
Full-text available
This paper introduces a Python application for visualizing the 3D stratigraphic architecture of porous sedimentary media. The application uses the parameter granulometry deduced from borehole lithological records to create interactive 3D HTML models of essential stratigraphic elements. On the basis of the high density of boreholes and the subsequen...
Article
Full-text available
Virtual reality technology has attracted researchers’ attention because it can provide users with a virtual interactive learning environment. Based on the theory of virtual reality technology, this paper proposes the system model design and architecture of virtual interactive music-assisted interactive teaching and realizes key technologies such as...
Article
Full-text available
A Chabot is a conversational intelligent agent that has the capability of engaging in human-like interaction with its users. A lot of chatbots have been developed, but to the best of our knowledge, there are few or no chatbots that have been developed for hostel location integrated with a recommendation component to ease the cost, time, and stress...
Chapter
Full-text available
Until quite recently, the most important thing a newcomer to the Web could do in order to prepare a website or your personal blog was to learn programming and markup languages such as PHP, Perl, .Net and HTML. Even after that, it would take hours of skilled programming and patience to set up a good website or Web Application. But in recent years th...
Article
Full-text available
Type: Review Full Text: PDF. HTML, PHP, EPUB A proper understanding of phosphorous (P) sorption-desorption property in acidic soils is very important for P fertilizer management practices. Soil acidity can be ameliorated with application of lime while phosphate fertilizer often applied to raise concentrations of available soil P to an adequate leve...
Article
Full-text available
Real-Time Streaming Protocol (RTSP) is an application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data. The Real-Time Streaming Protocol (RTSP) is tried-and-true video technology. It's used to control audio/video transmission between t...
Article
Full-text available
This study focuses on the developed web-based information system which allows local government unit (LGU) in Samar Island and other agricultural sectors to have access to updated farmers’ information and the soil nutrient, soil fertility status, and the crop suitability of soil in the different municipalities of Samar. Geo-referenced agricultural m...
Article
Full-text available
These In recent years, the intense competition in development of new products followed by their rapid prototyping has given rise to an intense competition in the market. In order to automate the design, development of Application Programming Interface (API) is most commonly followed method. The presented work showcases an attempt to develop an API...
Article
Full-text available
This study elaborates not only the importance and application but also process and prospects of XBRL (Extensible Business Reporting Language) in financial reporting system. The fundamental objective of online financial reporting is to provide users with the timely delivery of useful information. However, the current reporting system is sustained by...
Article
Full-text available
Education systems of developing countries are improving with the help of information and communication technology ICT. Recent example is blended learning that is becoming popular in higher institution because of COVID-19. Meanwhile, truancy is becoming a lingering problem in post-primary school in Nigeria contributing to decline in academic perform...
Article
Full-text available
Energy-based models (EBMs) are experiencing a resurgence of interest in both the physics community and the machine learning community. This article provides an intuitive introduction to EBMs, without requiring any background in machine learning, connecting elementary concepts from physics with basic concepts and tools in generative models, and fina...
Article
Full-text available
Reporting standards, such as PRISMA aim to ensure that the methods and results of systematic reviews are described in sufficient detail to allow full transparency. Flow diagrams in evidence syntheses allow the reader to rapidly understand the core procedures used in a review and examine the attrition of irrelevant records throughout the review proc...
Article
Full-text available
The examination system of our university is based on a semester system. It has to run eight semesters in four years. The exam controller of this university has to maintain a large number of students in each semester examination. Sometimes it becomes so messy. As a result, it takes too many times to publish the results. Even it may occur minor error...
Article
Full-text available
New methods of identifying and fixing accessibility issues on websites are presented in this article. The websites taken into consideration by the research are created with content management systems (like WordPress or Joomla!). Our main goal was to develop different methods to improve accessibility that may be used by various user groups (website...
Conference Paper
Full-text available
Google chrome is a world-famous web browser, and it is a free cross-platform web browser developed by Google. This research paper discusses some vulnerabilities of the google chrome browser and mitigation methods with a codebase solution. Analyzing source code innerHTML function has some vulnerabilities vulnerable to UXSS attack. It is Classic Dom-...
Article
Full-text available
With the development of science and technology, in order to provide better financial information for economic decision-making, people urgently need a new financial reporting model. For the existing financial reporting model, it is only published in PDF or HTML format. This paper introduces multimedia technology and XBRL to reform, and studies the f...
Article
Full-text available
Type: Research Full Text: PDF, HTML, PHP, EPUB The study investigated the utilization of social networks for enhanced collaborative learning among library and information science students of federal universities in Southeast Nigeria. A descriptive survey was adopted for the study. The study adopted a multi-stage sampling technique. First is the pur...
Article
Full-text available
Today's growing phishing websites pose significant threats due to their extremely undetectable risk. They anticipate internet users to mistake them as genuine ones in order to reveal user information and privacy, such as login ids, pass-words, credit card numbers, etc. without notice. This paper proposes a new approach to solve the anti-phishing pr...
Article
Full-text available
The generation of different types of defective viral genomes (DVG) is an unavoidable consequence of the error-prone replication of RNA viruses. In recent years, a particular class of DVGs, those containing long deletions or genome rearrangements, has gain interest due to their potential therapeutic and biotechnological applications. Identifying suc...
Article
Full-text available
Highway concessionaires in Malaysia spend considerable assets for managing different forms of data during highway projects life cycle. In this context, and based on the use of modern technologies, an enormous volume of highway data is generated daily. These data can be utilized to extract and evaluate indicators to analyze highway green performance...
Book
Full-text available
The study ventures into a topic that has been so far largely neglected in film studies: the ‘gypsy’ phantasm on the big screen. It reconstructs the history of ‘gypsy’ representations in film since the birth of the medium providing a systematic film-theoretical analysis of their aesthetic and social functions. Based on a corpus of over 150 works fro...
Article
Full-text available
Advancements in the field of cancer research have enabled researchers and clinicians to access a massive amount of data to aid cancer patients and to add to the existing knowledge of research. However, despite the existence of reliable sources for extricating this data, it remains a challenge to accurately comprehend and draw conclusions based on t...
Article
Full-text available
Issue addressed: This study evaluated the readability of webpages from two public-facing Victorian Government websites that were responsible for communicating key health messages relating to the COVID-19 pandemic in 2020. Methods: Webpages were downloaded and filtered to identify relevant materials (English language materials containing HTML fil...
Article
Full-text available
File-Type Identification (FTI) is one of the essential functions that can be performed by examining the data blocks' magic numbers. However, this examination leads to a challenge when a file is corrupt, or these magic numbers are missing. Content-based analytics is the best way for file type identification when the magic numbers are not available....
Article
Full-text available
In international methods of our study, we learned about many websites that provide opportunities for the unemployed, such as (Dice) (Bayt.com), (Career Builder), and (Indeed). We finally arrived at this site, that is in your hands. Which is the system (Bootstrap\Web design) designed along the lines of the consists site, that is approved by internat...
Article
Full-text available
Heavy metal (HM) toxicity, ecological risk, and pollution sources were analyzed using the pollution indexing and statistical methods in the Three Gorges Reservoir (TGR). The average concentration of HM increased in the order of Cr < Ni < As < Cd < Cu < Mn < Pb < Zn < Al < Fe during the recharge period and Cd < Cr < Ni < As < Cu < Pb < Mn < Zn < Al...
Article
Full-text available
The PDF version of this article reflected an older version of the article with an incorrect URL for reference 17, while the HTML version was correct. The PDF has been updated to the correct version.
Article
Full-text available
This is an Erratum to "Carrier Status for p.Gly61Glu and p.Arg368His CYP1B1 Mutations Causing Primary Congenital Glaucoma in Iran" [J Ophthalmic Vis Res 2021;16(4):574–581] and does not have an abstract. Please download the PDF or view the article HTML.
Article
Full-text available
This is an Editorial and does not have an abstract. Please download the PDF or view the article HTML.
Article
Full-text available
Trong bài báo trích xuất thông tin về các tuyến xe khách liên tỉnh, bài báo đã sử dụng phương pháp trích xuất dựa vào cây phân tích cấu trúc DOM (Document Object Model) kết hợp với tập mẫu thực hiện rút trích dữ liệu. Bài báo tập trung nghiên cứu bài toán trích xuất thông tin từ dữ liệu web (HTML) bán cấu trúc và áp dụng để xây dựng một công cụ rút...
Technical Report
Full-text available
In this project, I used fabricated data generated using a data generator tool. The code is in the HTML jupyter files accessible here: https://github.com/HENRY-JERRY/Insurance-Fraud-Detection
Article
Full-text available
In order to improve the effect or characteristics of Python data analysis and attribute information extraction, a method for intelligent decision system is proposed. The content of the method is as follows: to create a big data mining model for optimal decision making, to use smart data integration method to integrate data functions, to reconstruct...
Article
Full-text available
Este artículo fue aprobado para publicación en el v71n1 de la Revista de la Fa-cultad de Medicina teniendo en cuenta los conceptos de los pares evaluadores y los cambios realizados por los autores según estos conceptos. Por lo tanto, se publica la versión preliminar del artículo para su consulta y citación provisional , pero debe aclararse que esta...