Search Results - (( code application svm algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…A prototype architecture and a user-friendly graphical interface tailored for SVM-based outbreak predictions are developed, accompanied by detailed code snippets elucidating essential steps in data loading, encoding, scaling, and SVM model training. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improving hand written digit recognition using hybrid feature selection algorithm by Wong, Khye Mun

    Published 2022
    “…In the field of machine learning, handwritten digit recognition was known as one of the crucial problems for pattern recognition and computer vision applications. There were a few applications of handwritten digit recognition, which include recognizing the digits on a utility map, zip code on a postal mail, identifying bank check amount processing and many more. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Classifying good and bad websites by Koo, Ee Woon

    Published 2015
    “…Hence, SVM classifier achieved the highest accuracy among all. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5
  6. 6
  7. 7
  8. 8

    Cross-project software defect prediction by Bala, Yahaya Zakariyau, Abdul Samat, Pathiah, Sharif, Khaironi Yatim, Manshor, Noridayu

    Published 2022
    “…Best performing classifiers include Logistic Regression and SVM. Despite various efforts to improve the performance of the CPDP model, the performance is below the applicable level. …”
    Get full text
    Get full text
    Article
  9. 9

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. An application called ‘AndroSensor’ on a smartphone, that retrieves real-time data from accelerometer, gyroscope and gravity sensors, is used as the input signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Improved Direct Torque Control (DTC) Performances Of Induction Machine Using Cascaded H-Bridge Multilevel Inverter by Ramahlingam, Sundram

    Published 2017
    “…The proposed DTC control algorithm can be optimally executed at high computation rate by totally using C-coding with DS1104 controller board. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20