Search Results - (( code classification using algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- classification using »
- code classification »
- java optimization »
- method algorithm »
- using algorithm »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
5
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
6
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
Get full text
Get full text
Get full text
Article -
7
-
8
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
Get full text
Get full text
Get full text
Article -
12
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
13
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
14
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…The algorithm experiments are carried out using the chain code representation created from previous research of the Centre of Excellence for Document Analysis and Recognition (CEDAR) dataset, which consists of 126 upper-case letter characters. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
17
Software Classification Using Structure-Based Descriptors
Published 2009“…This work includes the use of structure information contained in source code programs to automate program classification. …”
Get full text
Get full text
Get full text
Thesis -
18
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Get full text
Get full text
Article -
19
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis
