Search Results - (( java implementation using algorithm ) OR ( using data svm algorithm ))

Refine Results
  1. 1

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Integrated ACOR/IACOMV-R-SVM Algorithm by Alwan, Hiba Basim, Ku-Mahamud, Ku Ruhana

    Published 2017
    “…The first algorithm, ACOR-SVM, will tune SVM parameters, while the second IACOMV-R-SVM algorithm will simultaneously tune SVM parameters and select the feature subset. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The Entropy and SVM (EaSVM) is relying on DARPA 99 dataset for analyzing the captured traffics based on anomalies and the use of SVM is to classify the entropy values of the data traffic into normal and abnormal behavior for more accurate results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Parallel execution of distributed SVM using MPI (CoDLib) by Salleh N.S.M., Suliman A., Ahmad A.R.

    Published 2023
    “…Support Vector Machine (SVM) is an efficient data mining approach for data classification. …”
    Conference paper
  13. 13
  14. 14

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
    Conference Paper
  15. 15
  16. 16
  17. 17

    Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm by Yusof, Norzihani, Rosidi, Siti Aishah Rosidi, Ibrahim, Nuzulha Khilwani Ibrahim, Ahmed Ali, Ahmed El-Mogtaba Bannga

    Published 2020
    “…From the results, the different value of accuracy for both SVM and Naïve Bayes Algorithm was 2.4%. The Naïve Bayes Algorithm displayed better result comparing to SVM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…Nevertheless, AC is not required for LCM if the original multi-spectral image is used. The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Forecasting FTSE Bursa Malaysia KLCI Trend with Hybrid Particle Swarm Optimization and Support Vector Machine Technique by Lee, Zhong Zhen, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah, Abraham, Ajith

    Published 2013
    “…The SVM algorithm uses the Radial Basis Function (RBF) kernel function and optim ization of the gam ma and large margin parameters are done using the PSO algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item