Search Results - (( parameter identification based algorithm ) OR ( code classification learning algorithm ))
Search alternatives:
- parameter identification »
- classification learning »
- identification based »
- code classification »
- learning algorithm »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. …”
Get full text
Get full text
Get full text
Article -
3
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
Get full text
Get full text
Get full text
Article -
4
Image classification based on sparse-coded features using sparse coding technique for aerial imagery: a hybrid dictionary approach
Published 2023“…Aerial photography; Aircraft detection; Antennas; Codes (symbols); Discrete cosine transforms; Discrete wavelet transforms; Glossaries; Image classification; Image coding; Image enhancement; Learning algorithms; Learning systems; Object recognition; Remote sensing; Satellite imagery; Satellites; Unmanned aerial vehicles (UAV); Discrete tchebichef transforms; Discriminative features; Finite Ridgelet Transform; Histogram of oriented gradients; Image processing and computer vision; Scale invariant feature transforms; SIFT; Sparse coding; Classification (of information)…”
Article -
5
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
Get full text
Get full text
Get full text
Article -
6
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…In this paper, a technique termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is specifically based on Gravitational Search Algorithm (GSA) is proposed to combine model order selection and parameter estimation in one process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Learning programming from source code examples is a common behavior among novices. …”
Get full text
Get full text
Get full text
Article -
9
Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model
Published 2012“…A hybrid identification algorithm based on Differential Evolution (DE) and PEM is proposed in this study for effective identification of a small scale helicopter's model parameters. …”
Get full text
Get full text
Monograph -
10
-
11
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
12
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Classification of machine learning engines using latent semantic indexing
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Parameter identification of thermoelectric modules using enhanced slime mould algorithm (ESMA)
Published 2024“…Competency of the proposed algorithm in generating the optimal parameters for TEMs was appraised based on 21 benchmarked design parameters, following the objective of root mean square error (RMSE) minimization between the temperature of both actual and estimated models. …”
Get full text
Get full text
Get full text
Article -
15
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
16
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
17
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
18
Classifying good and bad websites
Published 2015“…The classification process is made easy by using set of features generated from HTML codes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
-
20
