Search Results - (( developing service svm algorithm ) OR ( java data function algorithm ))
Search alternatives:
- developing service »
- function algorithm »
- svm algorithm »
- data function »
- service svm »
- java »
-
1
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Sentiment analysis of customer review for Tina Arena Beauty
Published 2025“…Three machine learning algorithms Naive Bayes, Random Forest, and Support Vector Machine (SVM) were evaluated, and SVM achieved the highest accuracy and was selected as the final classifier. …”
Get full text
Get full text
Student Project -
6
Preliminary analysis of malware detection in opcode sequences within IoT environment
Published 2020“…With the technological development and means of communication, the Internet of Things (IoT) has become an essential role in providing many services in daily life through millions of heterogeneous but interconnected devices and nodes. …”
Get full text
Get full text
Get full text
Article -
7
Sentiment analysis for airline services on Twitter using deep learning with word embedding / Mawada Mohamed Nour El Daim El Khalifa
Published 2020“…Meanwhile, in recent years, Deep Learning algorithms for Sentiment Analysis has emerged as one of the most popular algorithms, which provides automatic feature extraction, rich representation capabilities, and better performance than most of the traditional learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
12
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…The evaluation will cover the product, services provided, delivery service and experience. …”
Get full text
Get full text
Get full text
Article -
13
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
14
Development of machine learning sentiment analyzer and quality classifier (MLSAQC) and its application in analysing hospital patient satisfaction from Facebook reviews in Malaysia
Published 2022“…Conclusion: Using data acquired from FB reviews and machine learning algorithms, a pragmatic and practical strategy for eliciting patient perceptions of service quality and supplementing standard patient satisfaction surveys has been created. …”
Get full text
Get full text
Thesis -
15
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Hotel recommendation system using machine learning
Published 2025“…There are three objectives in the study, which is to perform data preprocessing on the Google Reviews dataset for hotels in Perak using an instant data scraper, to develop three suitable machine learning models on the cleaned dataset and evaluate their performance, and to propose a recommendation system based on the developed machine learning models. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
Published 2023“…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
Get full text
Get full text
Get full text
Article -
19
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
Get full text
Get full text
Student Project -
20
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
