Search Results - (( user computing techniques algorithm ) OR ( java optimization svm algorithm ))
Search alternatives:
- computing techniques »
- java optimization »
- optimization svm »
- user computing »
- svm algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
-
3
Malay cuisine cooking recipe recommendation system using Genetic Algorithm (GA) / Nur Nazihah Ismail
Published 2017Get full text
Get full text
Student Project -
4
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
6
-
7
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…Dijkstra’s algorithm is the technique that can solve the problem by itself. …”
Get full text
Get full text
Thesis -
9
-
10
Graphical user authentication system (GUAS)
Published 2014“…Nowadays, the most accepted computer authentication technique is to use alphanumerical usernames with text-based password. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…The Energy Detection (ED) technique is the simplest and low computational complexity. …”
Get full text
Get full text
Thesis -
13
Agent-based extraction algorithm for computational problem solving
Published 2015“…Various CPS techniques have been proposed such as PAC, IPO, Flowchart and Algorithm. …”
Get full text
Get full text
Thesis -
14
Tag clouds algorithm with the inclusion of personality traits
Published 2015Get full text
Get full text
Get full text
Thesis -
15
-
16
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
17
-
18
Mobile game application development using evolutionary algorithms
Published 2014“…The aim of this research is to develop an application that contains evolutionary computing techniques that will be used by the user as an entertainment tool. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
