Search Results - (( java application using algorithm ) OR ( peer optimization svm algorithm ))
Search alternatives:
- peer optimization »
- java application »
- optimization svm »
- using algorithm »
- svm algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Hybrid ACO and SVM algorithm for pattern classification
Published 2013Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Solving SVM model selection problem using ACOR and IACOR
Published 2013Get full text
Get full text
Get full text
Article -
9
-
10
Integrated ACOR/IACOMV-R-SVM Algorithm
Published 2017Get full text
Get full text
Get full text
Article -
11
Forecasting FTSE Bursa Malaysia KLCI Trend with Hybrid Particle Swarm Optimization and Support Vector Machine Technique
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
LS-SVM Hyper-parameters Optimization Based on GWO Algorithm for Time Series Forecasting
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Mixed variable ant colony optimization technique for feature subset selection and model selection
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021Get full text
Get full text
Get full text
Article -
19
-
20
