Search Results - (( java implementation svm algorithm ) OR ( using constructs trust algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…This study used purposive sampling for sample selection. Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Modified quasi-Newton type methods using gradient flow system for solving unconstrained optimization by Yap, Chui Ying

    Published 2016
    “…We investigate the possible use of control theory, particularly theory on gradient ow system to derive some modified line search and trust region methods for optimization. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
    Get full text
    Get full text
    Thesis
  7. 7

    FACTORS INFLUENCING THE INTENTION TO ADOPT E-WALLET: A REGIONAL DISTRIBUTION PERSPECTIVE IN MALAYSIA by Liew, Vernon, Poh, Phaik See

    Published 2022
    “…Based on parameters of two tailed test with confidence interval of 95% (significance level 0.05), a total of 400 responses were analysed via SmartPLS with PLS-SEM algorithm. Knowledge, perceived ease of use, perceived usefulness, and the mediating effect of perceived trust on knowledge were found significant. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…The general approach uses trusted devices (specifically smartcards) to provide an area of secure processing and storage. …”
    Get full text
    Get full text
    Thesis