Search Results - (( ii optimization _ algorithm ) OR ( code classification using algorithm ))
Search alternatives:
- classification using »
- code classification »
- ii optimization »
- using algorithm »
-
1
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. Training and testing data in the study used a mixed model, namely data division, split model and cross validation. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Moreover with simple concatenating features, classification results are not optimal. It is crucial to integrate these heterogeneous features to create more accurate and robust classification results than using each individual type of features. …”
Get full text
Get full text
Thesis -
4
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Classification of metamorphic virus using n-grams signatures
Published 2020“…Then, the virus cluster is evaluated using Naïve Bayes algorithm in terms of accuracy using performance metric. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…This study suggests the work to combine the optimization of feature selection and algorithm parameters to achieve higher accuracy and acquire more reliable comparison.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Using genetic algorithms to optimise land use suitability
Published 2012“…The third objective is to optimize the land use map using economic benefits. …”
Get full text
Get full text
Thesis -
8
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Blood cell classification using deep learning
Published 2022“…The sole objective of the continuation of this project II is to define an efficient WBC classification model from scratch. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
11
A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks
Published 2019“…The multilayered version of CSC(ML-CSC) is shown to be connected to forward pass of CNNs and dictionary learning and sparse coding algorithms of this model are analyzed for solving classification and inverse problems in image processing. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…Furthermore, classification using the Random Forest algorithm depicted that a 95.3% accuracy (k=0.768), confirming robust predictive capability in identifying course approval status and demand trends. …”
Get full text
Get full text
Get full text
Article -
13
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
14
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
Get full text
Get full text
Get full text
Article -
15
-
16
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
Get full text
Get full text
Get full text
Article -
19
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
20
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…The algorithm experiments are carried out using the chain code representation created from previous research of the Centre of Excellence for Document Analysis and Recognition (CEDAR) dataset, which consists of 126 upper-case letter characters. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
