Search Results - (( java implementation svm algorithm ) OR ( basic computing ant algorithm ))
Search alternatives:
- java implementation »
- implementation svm »
- basic computing »
- svm algorithm »
- computing ant »
- ant algorithm »
-
1
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
4
Fuzzy C means imputation of missing values with ant colony optimization
Published 2020Get full text
Get full text
Article -
5
-
6
-
7
Neural Network – A Black Box Model
Published 2024“…A variety of metaheuristic algorithms have been used to train ANN, including Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Ant Colony Optimization (ACO), Tabu Search (TS), and Harmony Search (HS). …”
Get full text
Get full text
Get full text
Book Chapter -
8
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
Get full text
Get full text
Get full text
Thesis
