Search Results - (( text classification system algorithm ) OR ( code classification using algorithm ))

Refine Results
  1. 1

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. Training and testing data in the study used a mixed model, namely data division, split model and cross validation. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Classification of metamorphic virus using n-grams signatures by A Hamid, Isredza Rahmi, Md Sani, Nur Sakinah, Abdullah, Zubaile, Mohd Foozy, Cik Feresa, Kipli, Kuryati

    Published 2020
    “…Then, the virus cluster is evaluated using Naïve Bayes algorithm in terms of accuracy using performance metric. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Moreover with simple concatenating features, classification results are not optimal. It is crucial to integrate these heterogeneous features to create more accurate and robust classification results than using each individual type of features. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Moreover, sparse coding has been commonly used in recent years for the purposes of retrieving and identifying images. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Comparative analysis for topic classification in juz Al-Baqarah by Rahman, Mohamad Izzuddin, Samsudin, Noor Azah, Mustapha, Aida, Abdullahi Oyekunle, Adeleke

    Published 2018
    “…This research project is aiming to create computing environment that enable us use to text mining the Quran. The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. …”
    Get full text
    Get full text
    Article
  8. 8

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11
  12. 12

    Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin by Basiruddin, Nurul Hafiza

    Published 2021
    “…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Malay festive seasons food recognition for calorie detection using SVM and ECOC approaches / Nurul Hafiza Binti Basiruddin, Zalikha Zulkifli and Samsiah Ahmad by Basiruddin, Nurul Hafiza, Zulkifli, Zalikha, Ahmad, Samsiah

    Published 2022
    “…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification, which is part of the Support Vector Machine (SVM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article