Search Results - (( _ applications mining algorithm ) OR ( code ((application use) OR (application a)) algorithm ))*
Search alternatives:
- applications mining »
- mining algorithm »
- application use »
- application a »
-
1
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
An enhanced android botnet detection approach using feature refinement
Published 2019“…Static analysis examines the application code thoroughly, dynamic analysis examines the behaviours of the botware applications, while hybrid analysis is the combination of both of these analyses. …”
Get full text
Get full text
Thesis -
4
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…T-junction and region, of a two-dimensional line drawing sketch. The closed loop chain code algorithm assumes that the sketch represents a three-dimensional solid object. …”
Get full text
Get full text
Get full text
Article -
5
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
7
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
8
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
Get full text
Get full text
Thesis -
9
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
Get full text
Get full text
Final Year Project -
10
-
11
Speech coding for Bluetooth with CVSD algorithm
Published 2004“…Speech coding is performed using numerous steps or operations specified as an algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
The evolution and trend of chain code scheme
Published 2008“…Since it was introduced by Freeman, the development of chain code and its application increases rapidly. This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
15
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes
Published 2019“…Three experiments were carried out to: (i) verify the applicability of the algorithms used in the proposed single-frame profilometry system; (ii) verify the applicability of the proposed phase error compensation algorithm; and (iii) compare the result of the proposed profilometry against the Mitutoyo CRYSTA-Plus M Series 196 coordinate-measuring machine (CMM). …”
Get full text
Get full text
Thesis -
17
-
18
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
Get full text
Get full text
Thesis -
19
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
20
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper
