Search Results - (( bayesian classification issues algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2

    Feature extraction using active appearance model algorithm with Bayesian classification approach by Nuruzzaman, Mohammad, Hussain, Azham, Mohamad Tahir, Hatim, Abu Seman, Mohamad Amir

    Published 2013
    “…This study enhances invariant recognition of human faces and analysis to improve face verification and identification performance using Active Appearance Model (AAM) for feature extraction with Bayesian classification approach. This paper addressed some of these issues to bring face recognition more closely to being useful for real-life applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    A Bayesian probability model for Android malware detection by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif

    Published 2021
    “…Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this issue, this study proposes an Android malware detection system based on permission features using Bayesian classification. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Bayesian probability model for Android malware detection by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif, Ahmad Firdaus, Zainal Abidin

    Published 2022
    “…Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this issue, this study proposes an Android malware detection system based on permission features using Bayesian classification. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.] by Mat, Nur Haziqah, Ahmad Zahida, Athifa Aisha, Abdul Malik, Siti Nurhaliza, Azmadi, Nur Athirah Syuhada, Senin, Syahrul Fithry

    Published 2021
    “…This invention can recognize a certain damage while the classification of defects is classified according to the features extracted from the images by using GLCM algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…Duplicate detection and classification of records in two real world datasets, namely Cora and Restaurant is experimented by Support Vector Machines, Naïve Bayes, Decision Tree and Bayesian Networks which are regarded as some prominent classification techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item