Search Results - (( development control classification algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- control classification »
- application testing »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…In this paper an algorithm is developed for automatic spray control system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Algorithms of Classification of Mass Problems of Production Subject Domains
Published 2019“…This paper develops the algorithms for classification of mass problems of production subject domains. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Effective k-Means Clustering in Greedy Prepruned Tree-based Classification for Obstructive Sleep Apnea
Published 2022“…Incorporation of prepruned decision trees to kmeans clustering through one to three types of tree-depth controllers and cluster partitioning was done to develop a combined algorithm named as Greedy Pre-pruned Treebased Clustering (GPrTC) algorithm. …”
Get full text
Get full text
Get full text
Article -
5
-
6
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…This classification is developed using static analysis in a controlled lab environment and the Drebin dataset is used as the training dataset. 800 apps from the Google Play Store have been chosen randomly to test the proposed classification. …”
Proceedings Paper -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Classification of gait parameters in stroke with peripheral neuropathy (PN) by using k-Nearest Neighbors (kNN) algorithm / N. Anang ...[et al.]
Published 2018“…This paper presents the gait pattern classification between 3 groups which are control, stroke only and stroke with Peripheral Neuropathy (SPN) using k-Nearest Neighbors (kNN) algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Classification of hand gestures from EMG signals / Diaa Albitar
Published 2022“…This study is to develop classification model to classify six hand gestures using Artificial Intelligent algorithm. …”
Get full text
Get full text
Thesis -
10
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
11
Hevea leaf features extraction and recognition algorithm for hevea clones classification using image / Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib
Published 2013“…As a result Wu et al. [1] was successful developed an efficient algorithm for the plant classification. 32 kinds of plants have been classified by using the algorithm. …”
Get full text
Get full text
Research Reports -
12
-
13
Investigation of the optimal sensor location and classifier for human motion classification
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Experimental results of the EBGWO algorithm on the NSL-KDD dataset in terms of number of selected features and classification accuracy are superior to other benchmark optimisation algorithms. …”
Get full text
Get full text
Thesis -
15
-
16
Intersection Features For Android Botnet Classification
Published 2019“…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
-
20
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis
