Search Results - (( gram detection using algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2
  3. 3

    Experimental analysis on the anti spam effectiveness - commercial, Bayesian and Ngram algortihm / Ahmad Kamal Ramli by Ramli, Ahmad Kamal

    Published 2008
    “…By using standard series of text messages which consists of spam and ham words, N-Gram algorithm performed very well. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Classification of metamorphic virus using n-grams signatures by A Hamid, Isredza Rahmi, Md Sani, Nur Sakinah, Abdullah, Zubaile, Mohd Foozy, Cik Feresa, Kipli, Kuryati

    Published 2020
    “…Then, the virus cluster is evaluated using Naïve Bayes algorithm in terms of accuracy using performance metric. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Research Book - data engineering and information security series 1

    Published 2017
    “…Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. …”
    Get full text
    Get full text
    Book
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria by Pawar, Shrikant, Bramha Chari, P. V., Lahiri, Chandrajit *

    Published 2019
    “…Essentially, QS is an intracellular signaling system which are different for the different gram characters of bacteria. While gram-negative bacteria use chemical autoinducer molecules like acyl-homoserine lactones (AHLs) for such signaling, the gram-positive bacteria use peptide-based signaling systems. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Computational stylometric model for oath and oath-like expressions in Quranic text by Alqurneh, Ahmad

    Published 2014
    “…To improve oath detection by OLEDA with scalable features in stylometry, character features are added, particularly character n-gram features, bigram and trigram. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Heartbeat disease diagnosis using text-based approaches by Khorasani, Ehsan Safar

    Published 2011
    “…Some of them used Artificial Neural Network method for detection and classification of heart sounds. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item