Search Results - (( code classification rules algorithm ) OR ( java communication system algorithm ))

Refine Results
  1. 1

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Get full text
    Get full text
    Article
  4. 4

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan C.H., Tan M.S., Chang S.-W., Yap K.S., Yap H.J., Wong S.Y.

    Published 2023
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Article
  5. 5

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Fuzzy Logic is used in the classification phase while HMM is used in the process of extracting features for the preparation of linguistic variables of the fuzzy rules. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
    Get full text
    Get full text
    Thesis
  7. 7

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…The first issue is, nodes in the Grid systems are dynamic where they can join or leave the system at any time. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…Accordingly, the pressure from the users of these systems for ways to communicate among all these machines is irresistible. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Classroom finder system with student availability, space and time constraint by Loh, Yong Bin

    Published 2024
    “…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis