Search Results - (( _ application testing algorithm ) OR ( code classification system algorithm ))
Search alternatives:
- classification system »
- application testing »
- code classification »
- testing algorithm »
- system algorithm »
-
1
A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping
Published 2016“…The TSS map was color-coded for visual interpretation. The efficiency of the proposed algorithm was investigated by dividing the validation data into two groups. …”
Get full text
Get full text
Get full text
Article -
2
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…To prevent such kinds of deadly scenarios, a reliable fall detection system must be developed to help many lives. In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…The performance of the classification system would be greatly degraded. To overcome this difficulty and to improve the performance of the system, a de-noising scheme is proposed to be used together with the system. …”
Get full text
Get full text
Thesis -
4
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
REAL TIME ABNORMAL SOUND DETECTION AND CLASSIFICATION FOR HOME ENVIRONMENT
Published 2011“…In this project, a system is designed to have abnormal sound detection and classification. …”
Get full text
Get full text
Final Year Project -
6
Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin
Published 2021“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Thesis -
7
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
8
Image classification based on sparse-coded features using sparse coding technique for aerial imagery: a hybrid dictionary approach
Published 2023“…Aerial photography; Aircraft detection; Antennas; Codes (symbols); Discrete cosine transforms; Discrete wavelet transforms; Glossaries; Image classification; Image coding; Image enhancement; Learning algorithms; Learning systems; Object recognition; Remote sensing; Satellite imagery; Satellites; Unmanned aerial vehicles (UAV); Discrete tchebichef transforms; Discriminative features; Finite Ridgelet Transform; Histogram of oriented gradients; Image processing and computer vision; Scale invariant feature transforms; SIFT; Sparse coding; Classification (of information)…”
Article -
9
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
10
An enhanced android botnet detection approach using feature refinement
Published 2019“…The experimental and statistical tests show that 97.28% accuracy achieved by Random Forest machine classifier, it performs well as compared to other classification algorithms. …”
Get full text
Get full text
Thesis -
11
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Article -
12
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
Get full text
Get full text
Get full text
Article -
16
The development of virtual product life cycle design tool using artificial intelligence technique
Published 2008“…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
Get full text
Monograph -
17
-
18
Classification of metamorphic virus using n-grams signatures
Published 2020“…Metamorphic virus has a capability to change, translate, and rewrite its own code once infected the system to bypass detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Modelling of clinical risk groups (CRGs) classification using FAM
Published 2006“…FAM is a fast learning algorithm and used less epoch training [4]. Based on its performance in doing the classification, FAM is theoretically suitable to do the CRGs classification. …”
Get full text
Get full text
Conference or Workshop Item -
20
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Malware attacks are attacks carried out by an attacker by sending malicious codes to various files or even many packages and servers. …”
Get full text
Get full text
Get full text
Article
