Search Results - (( java application customization algorithm ) OR ( software identification learning algorithm ))
Search alternatives:
- customization algorithm »
- software identification »
- identification learning »
- learning algorithm »
- java application »
-
1
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The proposed algorithm is able to improve the weaknesses in PQF model in updating and learning the important attributes for software quality assessment. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
-
5
Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
Get full text
Get full text
Student Project -
7
-
8
Preserving the topology of self-organizing maps for data analysis: A review
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Bacteria identification via Artificial Neural Network based-on Bergey’s manual
Published 2017“…Levenberg Marquardt algorithm based Feed-forward backpropagation with Multilayer perceptron type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results within short period of time.…”
Get full text
Get full text
Student Project -
12
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Moreover, applying machine learning algorithms in the identification and classification of conflicting flows has limitations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Application of artificial neural network in bacteria identification based on Bergey’s manual: Hydrogenophilaceae family: article
Published 2017“…Levenberg Marquardt algorithm based Feedforward backpropagation with Multilayer perceptrons type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results. within short period time.…”
Get full text
Get full text
Article -
14
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…—In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
Get full text
Get full text
Get full text
Article -
15
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
Get full text
Get full text
Article -
16
Designing an integrated AIOT system for tracking class attendance
Published 2024“…The system is able to capture the students' real facial feature data, and uses it as a tool to achieve high-accuracy student identification. Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Cabbage disease detection system using k-NN algorithm
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
18
-
19
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
