Search Results - (( java application tree algorithm ) OR ( user computing knowledge algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.] by Buja, Al Ya@Geogiana, Ahmad, Illiasaak, Zolkeply, Mohd Syafiq

    Published 2014
    “…Most of the victims that involved in this case is an IT illiterate user who literally does not have enough knowledge to differentiate between the fake emails. …”
    Get full text
    Get full text
    Research Reports
  4. 4
  5. 5

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This has led to a great migration of users to cloud computing from other modes of computing. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad by Mohd Lokman, Anitawati, Ahmad, Aishah

    Published 2012
    “…This research presents new knowledge to enhance search result and contribute to the body of knowledge in Mathematics and Computing area. …”
    Get full text
    Get full text
    Research Reports
  15. 15

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…Password gives user access to the university computing services. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis