Search Results - (( data implication mining algorithm ) OR ( code classification approach algorithm ))
Search alternatives:
- code classification »
- data implication »
- mining algorithm »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
Get full text
Get full text
Article -
3
-
4
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
5
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…In recent years, there is an increase in the number of open source software.Hence, the demand for automatic software classification is also increasing.Latent Semantic Indexing (LSI) is an information retrieval approach that is utilized in classifying source code programs. …”
Get full text
Get full text
Get full text
Article -
6
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
7
Chain coding and pre processing stages of handwritten character image file
Published 2010“…Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. …”
Get full text
Get full text
Get full text
Article -
8
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
Get full text
Get full text
Get full text
Article -
9
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Article -
10
Intelligent mining of large-scale bio-data: bioinformatics applications
Published 2017“…It also highlights some future perspectives of data mining in bioinformatics that can inspire further developments of data mining instruments. …”
Get full text
Get full text
Get full text
Article -
11
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…The result showed that the hybrid mRMR+SVM-RFE was better than both the sole SVM-mRMR and the sole SVM-RFE approaches in the sense that the hybrid approach achieved higher classification accuracy by using a smaller amount of features.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
Get full text
Get full text
Article -
15
Organizational Culture Automated Audit System (OCAAS)
Published 2017“…Several state of the art technologies and techniques were used to design and developed OCAAS which include the use of machine learning and sentiment analysis based novel opinion mining algorithms for electronic opinion analysis and computerized statistics based mathematical algorithms for electronic data analysis as well as MySQL database integration for faster data processing and cognitive ergonomics system interface for user friendly interface navigation.…”
Get full text
Get full text
Get full text
Thesis -
16
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Malware attacks are attacks carried out by an attacker by sending malicious codes to various files or even many packages and servers. …”
Get full text
Get full text
Get full text
Article -
17
Datasets Size: Effect on Clustering Results
Published 2013“…This gives a wider acceptance to data mining, being an interdisciplinary field that implements algorithm on stored data with a view to discovering hidden knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
18
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The best algorithm will not be the same for all the data sets. …”
Get full text
Get full text
Book Section -
20
