Search Results - (( developing based svm algorithm ) OR ( java applications using algorithm ))

Refine Results
  1. 1

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Correlation Feature Selection Weighting Algorithms for Better Support Vector Classification: An Empirical Study by Sim, Doreen Ying Ying, Teh, Chee Siong, Ahmad Izuanuddin, Ismail

    Published 2020
    “…Proposed cfsw-SVM algorithms are then developed. Proposed formulations on SVM regularization parameter provides synergistic adjustments between prediction or classification accuracy and the level of correlations among features in the SVM implemented. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Meanwhile, an improved parallel Jaya (IPJAYA) algorithm was proposed for searching the best parameters (C, Gama) values of SVM. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…A prototype architecture and a user-friendly graphical interface tailored for SVM-based outbreak predictions are developed, accompanied by detailed code snippets elucidating essential steps in data loading, encoding, scaling, and SVM model training. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Simultaneous fault diagnosis based on multiple kernel support vector machine in nonlinear dynamic distillation column by Taqvi, S.A.A., Zabiri, H., Uddin, F., Naqvi, M., Tufa, L.D., Kazmi, M., Rubab, S., Naqvi, S.R., Maulud, A.S.

    Published 2022
    “…In the developed MK-SVM algorithm, multilabel approach based on various kernel functions has been utilized for the classification of simultaneous faults. …”
    Get full text
    Get full text
    Article
  8. 8

    Implementation of Space Vector Modulation for Voltage Source Inverter by Sanusi, Syamim, Ibrahim, Zulkifli, Jidin , Auzani, JOPRI, MOHD HATTA, Abdul Karim, Kasrul, Othman, Md Nazri

    Published 2013
    “…This paper presents a development of a voltage source inverter (VSI) for electrical drive applications based on Space Vector Modulation (SVM) technique and the SVM algorithm is implemented using digital signal processor (DSP). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Diagnosis and treatment recommender system for myocardial infarction using decision tree and Support Vector Machines (SVM) / Wan Marzuqiamrin Wan Mansor by Wan Mansor, Wan Marzuqiamrin

    Published 2025
    “…This project presents the development process of the prototype for diagnosis and treatment recommender system for myocardial infarction using decision tree and support vector machine (SVM) algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…However, the imbalanced LR-based methods are not extensively developed such as imbalanced SVM-based methods. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analysing machine learning models to detect disaster events using social media by Faris Azni Azlan, Mr.

    Published 2023
    “…To simulate the examining process further, a fuzzy algorithm is developed to automatically rate the severity of a disaster as described in each message in disaster environment. …”
    text::Thesis
  15. 15

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article