Search Results - (( user computing based algorithm ) OR ( evolution optimization svm algorithm ))
Search alternatives:
- evolution optimization »
- optimization svm »
- computing based »
- user computing »
- svm algorithm »
-
1
Improved whale optimization algorithm for feature selection in Arabic sentiment analysis
Published 2019“…In SA, feature selection phase is an important phase for machine learning classifiers specifically when the datasets used in training is huge. Whale Optimization Algorithm (WOA) is one of the recent metaheuristic optimization algorithm that mimics the whale hunting mechanism. …”
Get full text
Get full text
Article -
2
Time series predictive analysis based on hybridization of meta-heuristic algorithms
Published 2018“…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
Get full text
Get full text
Article -
3
Classification with degree of importance of attributes for stock market data mining
Published 2004“…Alan Fan et aI., [2] use Support Vector Machine (SVM) to stock market prediction. The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
Get full text
Get full text
Article -
4
Time series predictive analysis based on hybridization of meta-heuristic algorithms
Published 2018“…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…It helps organization to reduce computing infrastructure cost. Incloud computing concept, cloud users can use computing resources according to their needs and requirements. …”
Get full text
Get full text
Thesis -
8
Relationship based replication algorithm for data grid
Published 2014“…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
Get full text
Get full text
Monograph -
9
-
10
-
11
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
14
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
15
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC showed an improved accuracy rate in task distribution and reduced the makespan of VM in a cloud data center. Based on the ANOVA comparison test results, a 1.25 percent improvement on accuracy and 0.98 percent reduced makespan on task allocation system of VM in cloud computing is observed with the proposed HBAC algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
17
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
18
Making location-aware computing working accurately in smart spaces
Published 2011“…The algorithm is based on “multiple observers” on ηk-Nearest Neighbour. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
Get full text
Get full text
Get full text
Article -
20
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
text::Thesis
