Search Results - (( code classification methods algorithm ) OR ( data classification _ algorithm ))
Search alternatives:
- classification methods »
- code classification »
- data classification »
- methods algorithm »
-
1
-
2
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…The hybrid method was exemplified in a binary classification between digits ‘4’ and ‘9’ from a multiple features dataset. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Multi-class classification automated machine learning for predicting earthquakes using global geomagnetic field data
Published 2025“…Through statistical analysis, important features were extracted and a multi-class classification model using geomagnetic data was created. …”
Get full text
Get full text
Get full text
Article -
4
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…In this research, several machine learning algorithms housed in WEKA data mining tool were proposed for the building of a classifier models, as compared with other earlier manual, and statistical analytical method which require high computational knowledge in coding, time consumption, and prion to human or computational error. …”
Get full text
Get full text
Get full text
Thesis -
5
Systematic review for phonocardiography classification based on machine learning
Published 2023“…This systematic review aims to examine the existing literature on phonocardiography classification based on machine learning, focusing on algorithms, datasets, feature extraction methods, and classification models utilized. …”
Get full text
Get full text
Article -
6
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…The data representation method employed was Freeman Chain Code (FCC). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…In order to improve the classification accuracy in the field of handwriting character recognition (HCR), the number of derivative algorithms has improved and the interest in feature extraction has increased. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
Phishing image spam classification research trends: Survey and open issues
Published 2020“…Achieving the study’s target, we carried out a broad survey and analysis to identify the domains where spam classification was applied. Furthermore, several public data sets, features set, classification methods, and measuring metrics are found and the popular once were pinpointed. …”
Get full text
Get full text
Article -
10
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…Each respondent underwent two mathematical game sessions using a smartphone with a two-minute break in between each session. From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
11
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Simulation produces satisfactory result in identifying the disturbance and proves that it is possible to use this model for power disturbance classification even in a noisy environment. A comparative study with Probabilistic Neural Network system has proved that the proposed system is better because it needs less memory space and shorter code execution time. …”
Get full text
Get full text
Thesis -
12
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
13
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
Get full text
Get full text
Monograph -
14
Improving brain tumor segmentation in MRI images through enhanced convolutional neural networks
Published 2023“…The proposed method will allow for efficient analysis and management of enormous amounts of MRI image data, the earliest practicable early diagnosis, and assistance in the classification of normal, benign, or malignant patient cases. …”
Get full text
Get full text
Article -
15
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
17
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
Published 2024“…However, these algorithms often suffer from the "black box" dilemma, a lack of transparency that hinders their applicability in security contexts where understanding the reasoning behind classifications is essential for effective risk assessment and mitigation strategies. …”
Get full text
Get full text
Get full text
Article -
18
Chain coding and pre processing stages of handwritten character image file
Published 2010“…Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. …”
Get full text
Get full text
Get full text
Article -
19
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. …”
Get full text
Get full text
Thesis -
20
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
Get full text
Get full text
Thesis
