Search Results - (( code classification using algorithm ) OR ( text classification based algorithm ))
Search alternatives:
- classification using »
- classification based »
- code classification »
- text classification »
- using algorithm »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Moreover with simple concatenating features, classification results are not optimal. It is crucial to integrate these heterogeneous features to create more accurate and robust classification results than using each individual type of features. …”
Get full text
Get full text
Thesis -
3
Phishing image spam classification research trends: Survey and open issues
Published 2020“…At present, the email is submerged with spam content, both in text-based form or undesired text planted inside the images. …”
Get full text
Get full text
Article -
4
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…This research project is aiming to create computing environment that enable us use to text mining the Quran. The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. …”
Get full text
Get full text
Article -
5
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Moreover, sparse coding has been commonly used in recent years for the purposes of retrieving and identifying images. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
-
9
-
10
-
11
-
12
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
13
-
14
Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin
Published 2021“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Thesis -
15
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…Furthermore, classification using the Random Forest algorithm depicted that a 95.3% accuracy (k=0.768), confirming robust predictive capability in identifying course approval status and demand trends. …”
Get full text
Get full text
Get full text
Article -
18
Malay festive seasons food recognition for calorie detection using SVM and ECOC approaches / Nurul Hafiza Binti Basiruddin, Zalikha Zulkifli and Samsiah Ahmad
Published 2022“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification, which is part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Text Steganography using Extensions Kashida based on the Moon and Sun Letters Concept
Published 2024“…The capacity performance of the proposed method is then compared to three popular text steganographic methods. Capacity is measured based on two factors which are Embedding Ratio (ER) and The Efficiency Ratio (TER). …”
Article -
20
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article
