Search Results - (( java implementation svm algorithm ) OR ( parameter programme gets algorithm ))*

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Hardware And Software Partitioning Using Genetic Algorithm In Image Processing Application by Loo, Fang Hean

    Published 2018
    “…The GA parameters such as population size, crossover percentage and mutation percentage are varied to get the optimum combination of GA parameters. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod by Mahmod, Nurzaima

    Published 2010
    “…The objective of this paper is to design and analysis matrix module of DNA sequence alignment accelerator using clock cycle to get high performance. The scope of this paper is to optimize the DNA sequences alignment on the matrix filling module by implementing a parallel method of the SmithWaterman algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    STUDY OF THE MICRO UNMANNED AERIAL VEHICLE (MUAV) VERTICAL TAKE-OFF AND LANDING (VTOL) CONTROL SYSTEM by Mohd Zulkifli, Mohd Syafiqrul Ikhwan

    Published 2011
    “…In this stage also, all the characteristics and parameters have been adjusted and perfected to get the desired results. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…These different designs were being compared in terms of several performance parameters to few available AES-XTS designs to date. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation techniques allow the programmer to customize which part of the code to be obfuscated. …”
    Get full text
    Get full text
    Thesis