Search Results - (( code classification techniques algorithm ) OR ( java implementation mechanism algorithm ))
Search alternatives:
- implementation mechanism »
- code classification »
- java implementation »
- mechanism algorithm »
- techniques »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…However, only supervised learning techniques have proofed insufficient for malware classification task. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. …”
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
4
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
Get full text
Get full text
Article -
5
-
6
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
Image retrieval of motifs in malay vernacular architecture / Puteri Nor Hashimah M. A. Rahman, Mohd Sabrizaa Abd. Rashid and Baharum Baharudin
Published 2012“…The algorithm will further classify the motifs into two main codes, i.e, Bunga' code and 'Daun' code. …”
Get full text
Get full text
Conference or Workshop Item -
9
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Get full text
Get full text
Article -
10
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
13
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
15
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Article -
16
-
17
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
18
-
19
Classifying good and bad websites
Published 2015“…The classification process is made easy by using set of features generated from HTML codes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Classification of metamorphic virus using n-grams signatures
Published 2020“…The first step is the classification model to cluster the metamorphic virus using TF-IDF technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
