Search Results - (( based evaluation a algorithm ) OR ( code classifications using algorithm ))
Search alternatives:
- classifications using »
- code classifications »
- based evaluation »
- using algorithm »
- evaluation a »
- a algorithm »
-
1
Maldroid- attribute selection analysis for malware classification
Published 2019“…The experiment evaluated 8000 real data samples and the result showed that InfoGainEval and KNN algorithm are the most selected in attribute selection and classification process.…”
Get full text
Get full text
Get full text
Article -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
4
Empowering cloud providers: optimised locust-inspired algorithm for SLA violation mitigation in green cloud computing
Published 2025“…It enhances the locust-inspired algorithm by integrating SLA-awareness and adaptive host classification and is evaluated using real workload traces in the CloudSim toolkit. …”
Get full text
Get full text
Get full text
Article -
5
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Systematic review for phonocardiography classification based on machine learning
Published 2023“…The materials and methods used in the study involve a comprehensive search of relevant literature and a critical evaluation of the selected studies. …”
Get full text
Get full text
Article -
7
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
Get full text
Get full text
Thesis -
8
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
9
Phishing image spam classification research trends: Survey and open issues
Published 2020“…A phishing email is an attack that focused completely on people to circumvent existing traditional security algorithms. …”
Get full text
Get full text
Article -
10
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…Furthermore, classification using the Random Forest algorithm depicted that a 95.3% accuracy (k=0.768), confirming robust predictive capability in identifying course approval status and demand trends. …”
Get full text
Get full text
Get full text
Article -
13
An enhanced android botnet detection approach using feature refinement
Published 2019“…The experimental and statistical tests show that 97.28% accuracy achieved by Random Forest machine classifier, it performs well as compared to other classification algorithms. Based on the test results, various open research issues which need to be addressed in future studies are highlighted.…”
Get full text
Get full text
Thesis -
14
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
15
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
Get full text
Get full text
Get full text
Article -
16
-
17
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
18
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…Afterwards, this study adopts Convolutional Neural Network (CNN) for malware detection and classification algorithm. We compare CAGDeep with a state-of-the-art Android malware detection approach. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Malay festive seasons food recognition for calorie detection using SVM and ECOC approaches / Nurul Hafiza Binti Basiruddin, Zalikha Zulkifli and Samsiah Ahmad
Published 2022“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification, which is part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
