Search Results - (( software organization learning algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- software organization »
- organization learning »
- learning algorithm »
- java application »
-
1
-
2
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
-
4
-
5
Preserving the topology of self-organizing maps for data analysis: A review
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, SelfOrganizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…The autonomous property of software agent enables it to continuously search for the suitable data that can meet the need and the expectation of the organization in maximizing the marketing effectiveness. …”
Get full text
Get full text
Conference or Workshop Item -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
Phishing Website Detection using Machine Learning
Published 2024Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
-
16
-
17
Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning
Published 2022“…The project will use natural language processing in extracting certain features as the input of an algorithm to generate a reputation score that will be trained using machine learning to build the detection model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Implementation of case-based reasoning in help desk system
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
20
