Search Results - (( developing program svm algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- developing program »
- learning algorithm »
- svm algorithm »
- program svm »
-
1
-
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
4
Lightning fault classification for transmission line using support vector machine
Published 2023“…The proposed method was implemented in the MATLAB/SIMULINK programming platform. The classification performance of the developed algorithms was evaluated using confusion matrix. …”
Get full text
Get full text
Conference or Workshop Item -
5
Lightning Fault Classification for Transmission Line Using Support Vector Machine
Published 2024“…The proposed method was implemented in the MATLAB/SIMULINK programming platform. The classification performance of the developed algorithms was evaluated using confusion matrix. …”
Conference Paper -
6
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin
Published 2014“…Later, a Least-Squares Support Vector Machine (LS-SVM) model was developed using cross-validation technique. …”
Get full text
Get full text
Thesis -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
12
Classification models for higher learning scholarship award decisions
Published 2018“…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…Multilayer Perceptron algorithm has been the best algorithm with the highest success percentage in both of the programs; Decision Trees has been the algorithm which has the lowest success percentage again in both of the programs. …”
Get full text
Get full text
Get full text
Article -
14
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…The Smooth Support Vector Machine (SSVM) is a further development of the SVM. Smoothing methods, extensively used for solving important mathematical programming problems and applications. …”
Get full text
Get full text
Thesis -
15
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…The Smooth Support Vector Machine (SSVM) is a further development of the SVM. Smoothing methods, extensively used for solving important mathematical programming problems and applications. …”
Get full text
Get full text
Undergraduates Project Papers -
16
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…VSCI was used as the indicator for the MLP of load buses. Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
Get full text
Get full text
Thesis -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
18
-
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise
