Search Results - (( java implementation a algorithm ) OR ( code classification techniques algorithm ))
Search alternatives:
- java implementation »
- code classification »
- implementation a »
- a algorithm »
- techniques »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…However, only supervised learning techniques have proofed insufficient for malware classification task. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. …”
Get full text
Get full text
Get full text
Article -
3
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
Get full text
Get full text
Article -
4
-
5
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
6
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
7
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
10
Image retrieval of motifs in malay vernacular architecture / Puteri Nor Hashimah M. A. Rahman, Mohd Sabrizaa Abd. Rashid and Baharum Baharudin
Published 2012“…The algorithm will further classify the motifs into two main codes, i.e, Bunga' code and 'Daun' code. …”
Get full text
Get full text
Conference or Workshop Item -
11
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
12
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Get full text
Get full text
Article -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
16
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
18
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Article -
19
-
20
