Search Results - (( code classification methods algorithm ) OR ( based classifications _ algorithm ))

Refine Results
  1. 1

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3
  4. 4

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Systematic review for phonocardiography classification based on machine learning by Altaf, Abdullah, Mahdin, Hairulnizam, Alive, Awais Mahmood, Ninggal, Mohd Izuan Hafez, Altaf, Abdulrehman, Javid, Irfan

    Published 2023
    “…This systematic review aims to examine the existing literature on phonocardiography classification based on machine learning, focusing on algorithms, datasets, feature extraction methods, and classification models utilized. …”
    Get full text
    Get full text
    Article
  6. 6

    Improving hand written digit recognition using hybrid feature selection algorithm by Wong, Khye Mun

    Published 2022
    “…The hybrid method was exemplified in a binary classification between digits ‘4’ and ‘9’ from a multiple features dataset. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Jamaludin, Sallim, Kohbalan, Moorthy

    Published 2021
    “…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Phishing image spam classification research trends: Survey and open issues by John Abari, Ovye, Mohd Sani, Nor Fazlida, Khalid, Fatimah, Mohd Yunus Bin Sharum, Mohd Yunus, Mohd Ariffin, Noor Afiza

    Published 2020
    “…This study reviews articles on phishing image spam classification published from 2006 to 2020 based on spam classification application domains, datasets, features sets, spam classification methods, and the measurement metrics adopted in the existing studies. …”
    Get full text
    Get full text
    Article
  10. 10

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…This thesis focuses on a Rule-Based method based on wavelet transform to detect and classify various events of power quality disturbances. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin by Basiruddin, Nurul Hafiza

    Published 2021
    “…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Malay festive seasons food recognition for calorie detection using SVM and ECOC approaches / Nurul Hafiza Binti Basiruddin, Zalikha Zulkifli and Samsiah Ahmad by Basiruddin, Nurul Hafiza, Zulkifli, Zalikha, Ahmad, Samsiah

    Published 2022
    “…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification, which is part of the Support Vector Machine (SVM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Text Steganography using Extensions Kashida based on the Moon and Sun Letters Concept by Shaker, AA, Farida Hazwani Mohd Ridzuan, Sakinah Ali Pitchay

    Published 2024
    “…The Arabic alphabet contains 28 letters, which are classified into 14 sun letters and 14 moon letters. This classification is based on the way these letters affect the pronunciation of the definite article (SIC) at the beginning of words. …”
    Article
  20. 20

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. …”
    Get full text
    Get full text
    Get full text
    Article