Search Results - (( java implementation svm algorithm ) OR ( basic computer cell algorithm ))
Search alternatives:
- java implementation »
- implementation svm »
- basic computer »
- cell algorithm »
- svm algorithm »
- computer cell »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
3
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
4
Memory-based Immune Network for Multi-Robot Cooperation
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Multi-Robot Cooperation using Immune Network with Memory
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A Refined Immune Systems Inspired Model for Multi-Robot Shepherding
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
A Refined Immune Systems Inspired Model For Multi-robot Shepherding
Published 2010Get full text
Get full text
Conference or Workshop Item -
9
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
10
