Search Results - (( java implementation based algorithm ) OR ( using based svm algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- svm algorithm »
- using based »
- based svm »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
-
6
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The Entropy and SVM (EaSVM) is relying on DARPA 99 dataset for analyzing the captured traffics based on anomalies and the use of SVM is to classify the entropy values of the data traffic into normal and abnormal behavior for more accurate results. …”
Get full text
Get full text
Get full text
Thesis -
7
Improved Manta Ray Foraging Optimizer-based SVM for Feature Selection Problems: A Medical Case Study
Published 2024“…The proposed approach is validated and compared with four SVM-based algorithms over eight benchmarking datasets. …”
Get full text
Get full text
Article -
8
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
9
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
11
Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters
Published 2024“…This study compares four machine learning algorithms Logistic Regression, Random Forest, Support Vector Machine (SVM), and K-Nearest Neighbors (KNN) in water quality classification based on contaminant parameters. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
15
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…Nevertheless, AC is not required for LCM if the original multi-spectral image is used. The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
Get full text
Get full text
Thesis -
16
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…The EFDT and hybrid DT-SVM algorithms were designed and deployed based on DT and SVM algorithms to achieve improved performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. …”
Get full text
Get full text
Final Year Project -
18
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. …”
Get full text
Get full text
Final Year Project -
19
Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram
Published 2021“…The supervised machine learning algorithm, SVM and Decision Tree are used for the estimation of the mangrove age into young and mature. …”
Get full text
Get full text
Thesis -
20
