Search Results - (( sequence classification mining algorithm ) OR ( code classifications learning algorithm ))

Refine Results
  1. 1
  2. 2

    Data mining of protein sequences with amino acid position-based feature encoding technique by Iqbal, M.J., Faye, I., Md Said, A., Samir, B.B.

    Published 2014
    “…The classification results indicate that the proposed encoding technique with a decision tree classification algorithm has achieved 85.9 classification accuracy over the Yeast protein sequence dataset. …”
    Get full text
    Get full text
    Article
  3. 3

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…In this paper, a systematic way to evaluate the association rules discovered from frequent itemset mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriated sequence of usage is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
    Get full text
    Get full text
    Article
  7. 7

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Image classification based on sparse-coded features using sparse coding technique for aerial imagery: a hybrid dictionary approach by Qayyum A., Saeed Malik A., Saad N.M., Iqbal M., Abdullah M.F., Rasheed W., Abdullah T.A.B.R., Bin Jafaar M.Y.

    Published 2023
    “…Aerial photography; Aircraft detection; Antennas; Codes (symbols); Discrete cosine transforms; Discrete wavelet transforms; Glossaries; Image classification; Image coding; Image enhancement; Learning algorithms; Learning systems; Object recognition; Remote sensing; Satellite imagery; Satellites; Unmanned aerial vehicles (UAV); Discrete tchebichef transforms; Discriminative features; Finite Ridgelet Transform; Histogram of oriented gradients; Image processing and computer vision; Scale invariant feature transforms; SIFT; Sparse coding; Classification (of information)…”
    Article
  9. 9

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A review on data stream classification by A. A, Haneen, A., Noraziah, Abd Wahab, Mohd Helmy

    Published 2018
    “…As such the typical tasks of searching data have been linked to streams of data that are inclusive of clustering, classification, and repeated mining of pattern. This paper presents several data stream clustering approaches, which are based on density, besides attempting to comprehend the function of the related algorithms; both semi-supervised and active learning, along with reviews of a number of recent studies.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Learning programming from source code examples is a common behavior among novices. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A Review on Data Stream Classification by A. A., Haneen, Noraziah, Ahmad, Mohd Helmy, Abd Wahab

    Published 2018
    “…As such the typical tasks of searching data have been linked to streams of data that are inclusive of clustering, classification, and repeated mining of pattern. This paper presents several data stream clustering approaches, which are based on density, besides attempting to comprehend the function of the related algorithms; both semi-supervised and active learning, along with reviews of a number of recent studies.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Get full text
    Get full text
    Article
  19. 19

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Classifying good and bad websites by Koo, Ee Woon

    Published 2015
    “…The classification process is made easy by using set of features generated from HTML codes. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD