Search Results - (( messaging application mining algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  2. 2

    Context aware app recommendation using email semantic analysis by Tang, Zi Cong

    Published 2019
    “…Email is a kind of electronic tool that people used to exchange message. There are many functionalities such as spam filt ering, categories section, malicious email identification and etc are available in the email application that had been launched in the existing market. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Previous researches on forensic investigation of social networking applications on smartphones were conducted using existing forensic analyzer tools and failed to identify important data remnants including passwords, GPS locations, uploaded files, posts and messages. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The leakage fault cases verify the algorithm�s applicability and complete the correlation diagnosis of water wall leakage fault. …”
    Article
  7. 7

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
    Get full text
    Get full text
    Article
  8. 8