Search Results - (( case optimization svm algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Salivary based SERS analysia in recognition of NS1 for PCA-SVM classification of dengue fever / Afaf Rozan Mohd Radzol by Mohd Radzol, Afaf Rozan

    Published 2018
    “…Finally, the extracted principal components are classified into dengue positive and negative using SVM algorithm. NS1 ELISA and NS1 Rapid serum tests result are used as benchmark against sensitivity, specificity and accuracy performance of the SVM algorithms in which three types of kernels i.e; Linear, RBF and MLP are optimized and compared. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Salivary based SERS analysis in recognition of NS1 for PCA-SVM classification of dengue fever / Afaf Rozan Mohd Radzol by Mohd Radzol, Afaf Rozan

    Published 2018
    “…Finally, the extracted principal components are classified into dengue positive and negative using SVM algorithm. NS1 ELISA and NS1 Rapid serum tests result are used as benchmark against sensitivity, specificity and accuracy performance of the SVM algorithms in which three types of kernels i.e; Linear, RBF and MLP are optimized and compared. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms by Masrom, S., Rahman, R.A., Mohamad, M., Rahman, A.S.A., Baharun, N.

    Published 2022
    “…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  10. 10

    Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms by Masrom, S., Rahman, R.A., Mohamad, M., Rahman, A.S.A., Baharun, N.

    Published 2022
    “…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  11. 11

    Salivary based sers analysis in recognition of ns1 for pcasvm classification of dengue fever / Afaf Rozan Mohd Radzol by Mohd Radzol, Afaf Rozan

    Published 2018
    “…Finally, the extracted principal components are classified into dengue positive and negative using SVM algorithm. NS1 ELISA and NS1 Rapid serum tests result are used as benchmark against sensitivity, specificity and accuracy performance of the SVM algorithms in which three types of kernels i.e; Linear, RBF and MLP are optimized and compared. …”
    Get full text
    Get full text
    Book Section
  12. 12
  13. 13

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  14. 14
  15. 15
  16. 16
  17. 17

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20