Search Results - (( shape identification using algorithm ) OR ( code classification techniques algorithm ))
Search alternatives:
- shape identification »
- identification using »
- code classification »
- using algorithm »
- techniques »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…However, only supervised learning techniques have proofed insufficient for malware classification task. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. …”
Get full text
Get full text
Get full text
Article -
3
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
Get full text
Get full text
Article -
4
-
5
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
6
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
7
Image retrieval of motifs in malay vernacular architecture / Puteri Nor Hashimah M. A. Rahman, Mohd Sabrizaa Abd. Rashid and Baharum Baharudin
Published 2012“…The algorithm will further classify the motifs into two main codes, i.e, Bunga' code and 'Daun' code. …”
Get full text
Get full text
Conference or Workshop Item -
8
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Get full text
Get full text
Article -
9
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Human identification at a distance using body shape information
Published 2013“…This paper presents an intelligent system approach for human identification at a distance using human body shape information. …”
Get full text
Get full text
Get full text
Article -
11
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Article -
13
-
14
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
15
-
16
Classifying good and bad websites
Published 2015“…The classification process is made easy by using set of features generated from HTML codes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Classification of metamorphic virus using n-grams signatures
Published 2020“…The first step is the classification model to cluster the metamorphic virus using TF-IDF technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Malware attacks are attacks carried out by an attacker by sending malicious codes to various files or even many packages and servers. …”
Get full text
Get full text
Get full text
Article
