Search Results - (( based segmentation path algorithm ) OR ( code classifications using algorithm ))

Refine Results
  1. 1

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The proposed algorithm generates the path within the prepared local map to find the path between start-to-goal positions to avoid obstacles and adhere to constraints. …”
    Get full text
    Thesis
  5. 5

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…A novel methodology was used to compute simple heart risk scores called non-laboratory based heart risk score (NLHRS). The methodology is proposed as stacking ensemble ML and the best ML algorithms are used as a base learner to compute relative feature weights. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Energy efficient path-planning for unmanned aerial vehicle by Debnath, Sanjoy Kumar

    Published 2022
    “…The proposed path planning algorithm is called Iterative Elliptical- Convex Visibility Graph (IECoVG) which is based on visibility graph (VG) and Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…The algorithm experiments are carried out using the chain code representation created from previous research of the Centre of Excellence for Document Analysis and Recognition (CEDAR) dataset, which consists of 126 upper-case letter characters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Modeling and querying alternative paths in Kuantan by Mohamad Salleh, Mazlina

    Published 2007
    “…Route finding solution takes the distance information in the form of directed graph based on starting (source) and ending (destination) nodes for the desired paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Software Classification Using Structure-Based Descriptors by Ramadan, Qusai Hussein

    Published 2009
    “…This work includes the use of structure information contained in source code programs to automate program classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
    Get full text
    Get full text
    Article
  19. 19

    Object tracing from synthetic fluid spray through instance segmentation by Md Refat Khan, Pathan

    Published 2024
    “…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
    Get full text
    Get full text
    Thesis
  20. 20