Search Results - (( automatic classification matching algorithm ) OR ( code classification using algorithm ))

Refine Results
  1. 1

    Automatic email classification system / Phang Siew Ting by Phang , Siew Ting

    Published 2003
    “…Automatic Email Classification System is an email reader tool that implements machine learning algorithm in email classification, manipulated by a Graphical User Interface. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Trademark image classification approaches using neural network and rough set theory by Saad, Puteh

    Published 2003
    “…The critical step in automatic trademark matching is to extract trademark features from the database automatically and reliably. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Feature-based face recognition system using utilized artificial neural network by Chai, Tong Yuen

    Published 2010
    “…The main contributions of this project are the automatic algorithms for mouth detection, facial features cropping and face classification. …”
    Get full text
    Thesis
  5. 5

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…In order to utilize the supervised classification algorithms without consuming a lot of time for labeling data manually, a two step method which selects the training data automatically has been proposed in previous studies. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Stage of maturity banana fruit classification using image processing / Nadia Kasim ... [et al.] by Kasim, Nadia, Zainol Abidin, Siti Nazifah, Abu Mangshor, Nur Nabilah, Mohamed Hamzah, Hazwa Hanim, Abd Rahim, Nurul Zahirah

    Published 2019
    “…The system showed 88.89% accuracy classification by comparing the result yield by the system with results offered by the experts. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimized image enhancement of colour processing for retinal fundus image by Nurul Atikah, Mohd Sharif

    Published 2025
    “…This study introduces two novel techniques designed to overcome the limitations of existing algorithms. Firstly, a new colour correction algorithm named Fuzzy Tuned Brightness Controlled Single-Scale Retinex Histogram Matching (fTBCSSRhm) is proposed to address the issue of colour inconsistency in the dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Optimized image enhancement of colour processing for retinal fundus image by Nurul Atikah, Mohd Sharif

    Published 2025
    “…This study introduces two novel techniques designed to overcome the limitations of existing algorithms. Firstly, a new colour correction algorithm named Fuzzy Tuned Brightness Controlled Single-Scale Retinex Histogram Matching (fTBCSSRhm) is proposed to address the issue of colour inconsistency in the dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application by Zun Liang, Chuan, David, Chong Teak Wei, Connie, Lee Wai Yan, Muhammad Fuad Ahmad, Nasser, Nor Azura Md, Ghani, Abdul Aziz, Jemain, Choong-Yeun, Liong

    Published 2023
    “…Moreover, the proposed identification algorithm is also tested in different scenarios, including based on the classification of strength association measurements between the extracted feature sets. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…It is impossible that two people have the same fingerprint. Automatics identification of humans based on fingerprint requires the input fingerprint to be match with a large number of fingerprints in the database. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  19. 19

    Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM) by Iqtait, M., Mohamad, F.S., Mamat, M.

    Published 2018
    “…Biometric is a pattern recognition system which is used for automatic recognition of persons based on characteristics and features of an individual. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Document clustering based on inverse document frequency measure by Wan Faridah Hanum, Wan Yaacob

    Published 2005
    “…Automatic classification techniques are capable of providing the necessary information organization by arranging the retrieved data into groups of documents with common subjects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis