Search Results - (( code classification methods algorithm ) OR ( level classification _ algorithm ))
Search alternatives:
- classification methods »
- level classification »
- code classification »
- methods algorithm »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Cross-project software defect prediction
Published 2022“…Through this work, it was discovered the majority of the selected studies used machine learning techniques as classification algorithms, and 64% of the studies used the combination of Object-Oriented (OO) and Line of Code (LOC) metrics. …”
Get full text
Get full text
Article -
3
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…The hybrid method was exemplified in a binary classification between digits ‘4’ and ‘9’ from a multiple features dataset. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Thesis -
5
Phishing image spam classification research trends: Survey and open issues
Published 2020“…The study revealed that Personal Collection, Dredze, and Spam Archives datasets are the most commonly used datasets in image spam classification research. Low-level and image metadata are the most widely used features set. …”
Get full text
Get full text
Article -
6
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…In this research, several machine learning algorithms housed in WEKA data mining tool were proposed for the building of a classifier models, as compared with other earlier manual, and statistical analytical method which require high computational knowledge in coding, time consumption, and prion to human or computational error. …”
Get full text
Get full text
Get full text
Thesis -
7
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
8
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
9
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
Get full text
Get full text
Monograph -
10
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
12
Chain coding and pre processing stages of handwritten character image file
Published 2010“…Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. …”
Get full text
Get full text
Thesis -
15
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media
Published 2024“…The results of the experiments show that the MCML classification algorithm successfully performs detailed classification and produces promising results for each classification level. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Confidential information can be categorized into various levels of classification. The classification depends on the level of damage to an organization or to national security when the information is disclosed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Minimizing Classification Errors in Imbalanced Dataset Using Means of Sampling
Published 2023“…Classification (of information); Learning algorithms; Students; Class imbalance; Data level; Over sampling; Performance prediction; SMOTE; Spread subsampling; Student performance; Student performance prediction; Under-sampling; Machine learning…”
Conference Paper -
20
