Search Results - (( software classification issues algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- software classification »
- classification issues »
- implication based »
- issues algorithm »
- java implication »
-
1
-
2
-
3
Mussels wandering optimization algorithmn based training of artificial neural networks for pattern classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
-
7
-
8
-
9
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
Get full text
Get full text
Thesis -
11
Filter-wrapper based feature ranking technique for dynamic software quality attributes
Published 2012“…The existing ranking techniques do not address the issue of redundancy in ranking the software quality attributes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) SRS have been collected as our case study and text mining technique is used to classify the ambiguity and unambiguity requirements. Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
14
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…This thesis proposes a classification model to detect water leakage, focusing on finding water leakage’s location and size, using K-Nearest Neighbour (K-NN) classification method. …”
Get full text
Get full text
Thesis -
16
A framework for malware identification based on behavior
Published 2012Get full text
Get full text
Thesis -
17
Implementation of lightweight cryptographic primitives
Published 2023“…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
Article -
18
Implementation of lightweight cryptographic primitives
Published 2023“…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
Article -
19
-
20
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The algorithm was mainly inspired by spatial pyramid pooling in generic image classification combined with PCA. …”
Get full text
Get full text
Thesis
