Search Results - (( code classification methods algorithm ) OR ( java applications tree algorithm ))
Search alternatives:
- classification methods »
- code classification »
- methods algorithm »
- java applications »
- applications tree »
- tree algorithm »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Chain coding and pre processing stages of handwritten character image file
Published 2010“…Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…The hybrid method was exemplified in a binary classification between digits ‘4’ and ‘9’ from a multiple features dataset. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
Get full text
Get full text
Thesis -
10
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
11
Cross-project software defect prediction
Published 2022“…Through this work, it was discovered the majority of the selected studies used machine learning techniques as classification algorithms, and 64% of the studies used the combination of Object-Oriented (OO) and Line of Code (LOC) metrics. …”
Get full text
Get full text
Article -
12
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
13
-
14
Phishing image spam classification research trends: Survey and open issues
Published 2020Get full text
Get full text
Article -
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
17
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
18
Blood cell classification using deep learning
Published 2022“…The sole objective of the continuation of this project II is to define an efficient WBC classification model from scratch. The motivation was gotten from the literature review section where various researchers developed their own methods manually through experimenting such as ensemble methods, learning algorithms, combined methodologies, etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Simulation produces satisfactory result in identifying the disturbance and proves that it is possible to use this model for power disturbance classification even in a noisy environment. A comparative study with Probabilistic Neural Network system has proved that the proposed system is better because it needs less memory space and shorter code execution time. …”
Get full text
Get full text
Thesis -
20
