Search Results - (( data code classification algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- code classification »
- java implementation »
- implementation case »
- case algorithm »
- data code »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The network traffic classification is essential in identifying and categorizing the network traffic data packets in the network transmission. …”
Get full text
Get full text
Get full text
Article -
3
-
4
-
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Maldroid- attribute selection analysis for malware classification
Published 2019“…The experiment evaluated 8000 real data samples and the result showed that InfoGainEval and KNN algorithm are the most selected in attribute selection and classification process.…”
Get full text
Get full text
Get full text
Article -
7
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
8
-
9
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
10
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…The data representation method employed was Freeman Chain Code (FCC). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
13
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. Training and testing data in the study used a mixed model, namely data division, split model and cross validation. …”
Get full text
Get full text
Get full text
Article -
14
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
19
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis
