Search Results - (( based applications model algorithm ) OR ( code classification using algorithm ))

Refine Results
  1. 1

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Scene classification for aerial images based on CNN using sparse coding technique by Qayyum, A., Malik, A.S., Saad, N.M., Iqbal, M., Faris Abdullah, M., Rasheed, W., Rashid Abdullah, T.A., Bin Jafaar, M.Y.

    Published 2017
    “…Thus, the proposed CNN-based sparse coding approach obtained a robust performance that holds promising potential for future applications in satellite and UAV imaging. © 2017 Informa UK Limited, trading as Taylor & Francis Group.…”
    Get full text
    Get full text
    Article
  4. 4

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…In this study, various machine learning models, namely Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Decision Tree, Random Forest, Logistic Regression and ensemble models such as, XGBoost, AdaBoost were used to harness the capabilities of network packet classification based on DSCP. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Deep learning based emotion recognition for image and video signals: matlab implementation by Ashraf, Arselan, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2021
    “…This book is carried out to develop an image and video-based emotion recognition model using CNN for automatic feature extraction and classification with Matlab sample codes. …”
    Get full text
    Get full text
    Book
  6. 6
  7. 7

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…Simulation produces satisfactory result in identifying the disturbance and proves that it is possible to use this model for power disturbance classification even in a noisy environment. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling of clinical risk groups (CRGs) classification using FAM by Mohd. Asi, Salina, Saad, Puteh

    Published 2006
    “…FAM is a fast learning algorithm and used less epoch training [4]. Based on its performance in doing the classification, FAM is theoretically suitable to do the CRGs classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Improving hand written digit recognition using hybrid feature selection algorithm by Wong, Khye Mun

    Published 2022
    “…While mRMR was capable of identifying a subset of features that were highly relevant to the targeted classification variable, it still carry the weakness of capturing redundant features along with the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia by San, Limhwee

    Published 2006
    “…The proposed algorithms were used to generate PM10 and AOT maps for the study areas. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Phishing image spam classification research trends: Survey and open issues by John Abari, Ovye, Mohd Sani, Nor Fazlida, Khalid, Fatimah, Mohd Yunus Bin Sharum, Mohd Yunus, Mohd Ariffin, Noor Afiza

    Published 2020
    “…This study reviews articles on phishing image spam classification published from 2006 to 2020 based on spam classification application domains, datasets, features sets, spam classification methods, and the measurement metrics adopted in the existing studies. …”
    Get full text
    Get full text
    Article
  15. 15

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…Furthermore, classification using the Random Forest algorithm depicted that a 95.3% accuracy (k=0.768), confirming robust predictive capability in identifying course approval status and demand trends. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article