Search Results - (( java application customization algorithm ) OR ( user optimization svm algorithm ))
Search alternatives:
- customization algorithm »
- user optimization »
- java application »
- optimization svm »
- svm algorithm »
-
1
Prediction of COVID-19 outbbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…A prototype architecture and a user-friendly graphical interface tailored for SVM-based outbreak predictions are developed, accompanied by detailed code snippets elucidating essential steps in data loading, encoding, scaling, and SVM model training. …”
Get full text
Get full text
Thesis -
2
-
3
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…The objective is to develop an innovative and user-friendly platform offering accurate job position predictions to aid job seekers in finding optimal career opportunities. …”
Get full text
Get full text
Thesis -
4
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…Based on this combination as well as significant features, this paper shows promising results with higher detection accuracy. The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. …”
Get full text
Get full text
Get full text
Article -
5
BCLH2Pro: a novel computational tools approach for hydrogen production prediction via machine learning in biomass chemical looping processes
Published 2024“…The algorithm has been developed into a user-friendly tool, BCLH2Pro, accessible via a web server. …”
Get full text
Get full text
Get full text
Article -
6
Drowsiness Detection Using Ocular Indices from EEG Signal
Published 2022“…These models were further optimized to improve their performance. We were able to show that features from EEG ocular artifacts are able to classify drowsy and alert states, with the optimized ensemble-boosted trees yielding the highest accuracy of 91.10 among all classic machine learning models. …”
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
Article -
9
-
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Predicting the onset of acute coronary syndrome events and in-hospital mortality using machine learning approaches / Song Cheen
Published 2023“…This web system was developed using a prototype-driven approach, emphasizing user feedback, and evaluated using the System Usability Scale (SUS). …”
Get full text
Get full text
Get full text
Thesis
