Search Results - (( gram detection using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- using algorithm »
- gram detection »
-
1
Classification of gram-positive and gram-negative bacterial images based on machine learning algorithm
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
3
Experimental analysis on the anti spam effectiveness - commercial, Bayesian and Ngram algortihm / Ahmad Kamal Ramli
Published 2008“…By using standard series of text messages which consists of spam and ham words, N-Gram algorithm performed very well. …”
Get full text
Get full text
Thesis -
4
Classification of metamorphic virus using n-grams signatures
Published 2020“…Then, the virus cluster is evaluated using Naïve Bayes algorithm in terms of accuracy using performance metric. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A Preemptive behaviour-based malware detection through analysis of API calls sequence inspired by Human Immune System
Published 2024journal::journal article -
6
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
7
Research Book - data engineering and information security series 1
Published 2017“…Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. …”
Get full text
Get full text
Book -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria
Published 2019“…Essentially, QS is an intracellular signaling system which are different for the different gram characters of bacteria. While gram-negative bacteria use chemical autoinducer molecules like acyl-homoserine lactones (AHLs) for such signaling, the gram-positive bacteria use peptide-based signaling systems. …”
Get full text
Get full text
Book Section -
10
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Computational stylometric model for oath and oath-like expressions in Quranic text
Published 2014“…To improve oath detection by OLEDA with scalable features in stylometry, character features are added, particularly character n-gram features, bigram and trigram. …”
Get full text
Get full text
Thesis -
12
Optimized deep learning techniques to identify rumors and fake news in online social networks
Published 2025“…N-gram model is used to do tokenization. LSTM, CNN, and AdaBoost algorithms are used to build the model. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Heartbeat disease diagnosis using text-based approaches
Published 2011“…Some of them used Artificial Neural Network method for detection and classification of heart sounds. …”
Get full text
Get full text
Thesis -
14
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
Get full text
Get full text
Thesis -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
