Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Keywords: Support vector machine
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
RETRACTED: Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs
Available to Purchase
International Journal of Pervasive Computing and Communications (2025) 21 (2): 189–205.
Published: 30 August 2022
... localization accuracy by identifying obstacles in the optimization process and network scenarios. Design/methodology/approach The proposed method is used to incorporate distance estimation between nodes and packet transmission hop counts. This estimation is used in the proposed support vector machine (SVM...
Journal Articles
Human activity recognition in WBAN using ensemble model
Available to Purchase
International Journal of Pervasive Computing and Communications (2023) 19 (4): 513–549.
Published: 10 March 2022
... is used as a new recognition approach with three classifiers, namely, “support vector machine (SVM), deep neural network (DNN) and fuzzy classifiers.” Experimental analysis is performed. Design/methodology/approach The proposed HCJO algorithm was developed for optimizing the membership function...
Journal Articles
RETRACTED: Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques
Available to Purchase
International Journal of Pervasive Computing and Communications (2025) 20 (4): 1–20.
Published: 18 October 2021
... to extract all aspects from customer tweets which are extracted using Twitter API. Findings The comparison of the results with traditional machine learning methods such as random forest algorithm, K-nearest neighbour and support vector machine using two data sets iPhone tweets and Samsung tweets have...
Journal Articles
RETRACTED: An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure
Available to Purchase
International Journal of Pervasive Computing and Communications (2022) 18 (1): 59–78.
Published: 06 September 2021
... of referrer values and few or nil image requests, that session gets included under the crawler label. Request method: If the request types were based highly on the HTTP HEAD method approach, there is a 70% chance to be a crawler. Intrusion detection system (IDS) Support vector machine...
