Search Results - (( data implication scheduling algorithm ) OR ( code classification techniques algorithm ))

Refine Results
  1. 1

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…However, only supervised learning techniques have proofed insufficient for malware classification task. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3

    Scene classification for aerial images based on CNN using sparse coding technique by Qayyum, A., Malik, A.S., Saad, N.M., Iqbal, M., Faris Abdullah, M., Rasheed, W., Rashid Abdullah, T.A., Bin Jafaar, M.Y.

    Published 2017
    “…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
    Get full text
    Get full text
    Article
  9. 9

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The central purpose of this research is to significantly increase the predictability of these milestone dates, thereby eliminating the risks associated with high and dynamic fluctuations in schedules. The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Modelling of heuristic distribution algorithm to optimize flexible production scheduling in Indian industry by Reddy, Guduru Ramakrishna, Singh, Harpreet, Domeika, Aurelijus, Manoj Kumar, Nallapaneni, Quanjin, Ma

    Published 2020
    “…In the present work, Two Heuristic Algorithms are modelled and the best algorithm among those two Heuristics is selected after few comparisons 3M to 5M, this can optimize the scheduling processes up to 10x10 jobs i.e. 10 machines and 10 jobs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan C.H., Tan M.S., Chang S.-W., Yap K.S., Yap H.J., Wong S.Y.

    Published 2023
    “…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
    Article
  14. 14
  15. 15
  16. 16

    Classifying good and bad websites by Koo, Ee Woon

    Published 2015
    “…The classification process is made easy by using set of features generated from HTML codes. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Classification of metamorphic virus using n-grams signatures by A Hamid, Isredza Rahmi, Md Sani, Nur Sakinah, Abdullah, Zubaile, Mohd Foozy, Cik Feresa, Kipli, Kuryati

    Published 2020
    “…The first step is the classification model to cluster the metamorphic virus using TF-IDF technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Malware attacks are attacks carried out by an attacker by sending malicious codes to various files or even many packages and servers. …”
    Get full text
    Get full text
    Get full text
    Article