Search Results - (( code classification technique algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- classification technique »
- code classification »
- using algorithm »
- java detection »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…However, only supervised learning techniques have proofed insufficient for malware classification task. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. …”
Get full text
Get full text
Get full text
Article -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
Get full text
Get full text
Article -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
-
7
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
Image retrieval of motifs in malay vernacular architecture / Puteri Nor Hashimah M. A. Rahman, Mohd Sabrizaa Abd. Rashid and Baharum Baharudin
Published 2012“…The algorithm will further classify the motifs into two main codes, i.e, Bunga' code and 'Daun' code. …”
Get full text
Get full text
Conference or Workshop Item -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Get full text
Get full text
Article -
12
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Article -
16
-
17
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
18
-
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
20
Classifying good and bad websites
Published 2015“…The classification process is made easy by using set of features generated from HTML codes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
