Search Results - (( program implementation connection algorithm ) OR ( code classification rules algorithm ))

Refine Results
  1. 1

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Get full text
    Get full text
    Article
  4. 4

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan C.H., Tan M.S., Chang S.-W., Yap K.S., Yap H.J., Wong S.Y.

    Published 2023
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Article
  5. 5

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Fuzzy Logic is used in the classification phase while HMM is used in the process of extracting features for the preparation of linguistic variables of the fuzzy rules. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
    Get full text
    Get full text
    Thesis
  7. 7

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior by Abidin H.Z., Din N.M., Radzi N.A.M.

    Published 2023
    “…The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm and another biological inspired algorithm. …”
    Article
  10. 10

    Control algorithm for two-tank system using multiparametric programming by Zakaria, A., Mid, E.C., Mohamed, M.F., Hussin, M.H.M., Shaari, A.S., Ruslan, Eliyana, Hadi, Dayanasari, Masri, M.

    Published 2023
    “…In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…In order to achieve this objective, each node must be connected in its shortest way as possible. We start our algorithm by designing shortest path algorithm based on Dijkstra's method. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14

    Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.] by Ismail, Razidah, Ahmad, Tahir, Harish, Noor Ainy, A. Halim, Rosenah

    Published 2011
    “…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
    Get full text
    Get full text
    Research Reports
  15. 15

    Design And Development Of Gas Argon Purging System by Ooi, Seng Yeong

    Published 2006
    “…AMPL is used in two ways of connection of its programming, first is Data Base, and second is PC element. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  17. 17

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…The templates are programmed in MATLAB. There are few rules in Cellular Neural Network that has to be implemented when programming the templates, such as the state equation, output equation, boundary condition and also the initial value. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems by Ismail, Razidah

    Published 2005
    “…To facilitate the implementation of these algorithms, a semi-automated computational tool using Matlab® programming facilities is developed. …”
    Get full text
    Get full text
    Thesis