Search Results - (( java implementation svm algorithm ) OR ( programmes program case algorithm ))
Search alternatives:
- java implementation »
- implementation svm »
- programmes program »
- case algorithm »
- svm algorithm »
- program case »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
3
Booth’s Algorithm Design Using Field Programmable Gate Array
Published 2014Get full text
Get full text
Get full text
Article -
4
-
5
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
Get full text
Get full text
Thesis -
6
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
7
-
8
-
9
-
10
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Small fitness values are often indicative of close-to-optimal control-variable values, as shown in this case. Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
Get full text
Get full text
Monograph -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. …”
Get full text
Get full text
Thesis -
12
Development of oil palm fresh fruit bunch maturity assessment software for personal digital assistant
Published 2011“…Both of the mentioned key technologies are already available in any modern Personal Digital Assistant (PDA), nominating them as capable, programmable and ultra-mobile devices in this field. …”
Get full text
Get full text
Thesis -
13
