Search Results - (( developing systems svm algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- developing systems »
- using algorithm »
- svm algorithm »
- systems svm »
-
1
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
4
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
5
Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain
Published 2020“…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
Get full text
Get full text
Thesis -
6
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
7
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
8
Diagnosis and treatment recommender system for myocardial infarction using decision tree and Support Vector Machines (SVM) / Wan Marzuqiamrin Wan Mansor
Published 2025“…This project presents the development process of the prototype for diagnosis and treatment recommender system for myocardial infarction using decision tree and support vector machine (SVM) algorithms. …”
Get full text
Get full text
Thesis -
9
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
10
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013“…There are numerous study in intrusion detection system (IDS) especially with Genetic algorithms (GA) and Support Vector Machine (SVM) but most of them did not get the potential of hybrid SVM using GA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
14
Lightning fault classification for transmission line using support vector machine
Published 2023“…The classification performance of the developed algorithms was evaluated using confusion matrix. …”
Get full text
Get full text
Conference or Workshop Item -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
Lightning Fault Classification for Transmission Line Using Support Vector Machine
Published 2024“…The classification performance of the developed algorithms was evaluated using confusion matrix. …”
Conference Paper -
17
Development of colorization of grayscale images using CNN-SVM
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
18
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Due to that reason, this study attempts to use SVM algorithm on employee’s performance databases for talent classification. …”
Get full text
Get full text
Research Reports -
19
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
20
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article
