Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » SVM

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Monitoring image-based processes using a PCA-based control chart and a classification technique Pages 39-52 Right click to download the paper Download PDF

Authors: Setareh Kazemi, Seyed Taghi Akhavan Niaki

DOI: 10.5267/j.dsl.2020.10.005

Keywords: SPC, PCA, Classification, LDA, QDA, KNN, SVM

Abstract:
Machine vision systems are among the novel tools proven to be useful in different applications, among which monitoring and controlling manufacturing processes is one of the most important ones. However, due to the complexity resulted from high-dimensional image data and their inherent correlations, the acquisition of traditional statistical process control tools seems inapplicable. To overcome the shortcomings of the traditional methods in this regard, a statistical model is proposed in this paper which utilizes the concepts of both the PCA-based T2 control chart and the classification methods to develop a tool capable of controlling an image-based process. By defining the warning zones, collected data taken from an image-based process are classified into more than the two classes related to in-control and out-of-control processes. This helps practitioners to define rules to make it easier to realize when the process is getting out of control. Through simulation, the accuracy performance and the speed of four different types of classifiers including linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), kth nearest neighbors (KNN), and support vector machine (SVM) are assessed in different scenarios, based on which the functionality of the proposed approach is evaluated in in-control and out-of-control conditions.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: DSL | Year: 2021 | Volume: 10 | Issue: 1 | Views: 1814 | Reviews: 0

 
2.

Sentiment analysis of social media discourse on public perception of online courier services in Saudi Arabia using machine learning Pages 217-226 Right click to download the paper Download PDF

Authors: Mohamed Shenify

DOI: 10.5267/j.ijdns.2024.8.002

Keywords: Social media, Sentiment analysis, Machine learning, Decision tree, SVM, Online courier services

Abstract:
The Kingdom of Saudi Arabia has witnessed a significant surge in online shopping in recent years, fueled by factors like growing internet penetration, smartphone adoption, and government initiatives supporting e-commerce growth. This rise in online activity has led to a corresponding increase in the utilization of online courier services, playing a crucial role in ensuring timely and efficient delivery of goods In this context, understanding public perception of online courier services becomes crucial for businesses to improve their offerings, address customer concerns, and maintain a competitive edge. Social media platforms have emerged as a valuable source of customer feedback and user-generated content, offering insights into customer experiences and opinions. This paper presents a sentiment analysis on online couriers in Saudi Arabia using natural language processing techniques combined with Decision Tree and Support Vector Machine (SVM) classifiers of machine learning. A dataset on customers’ sentiments was created by a crawling process from X social media. Both classifiers perform well, with Decision Tree classifier performs slightly better on accuracy, i.e. 95.01% compared to 93.60% of the Support Vector Machine. Other metrics support the robustness of the classification.

Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 1 | Views: 520 | Reviews: 0

 
3.

Detecting DDoS attacks using machine learning algorithms and feature selection methods Pages 2307-2318 Right click to download the paper Download PDF

Authors: Mohammed Amin Almaiah, Rana Alrawashdeh, Tayseer Alkhdour, Romel Al-Ali, Gaith Rjoub, Theyazan Aldahyani

DOI: 10.5267/j.ijdns.2024.6.001

Keywords: DDoS Attacks, Machine learning algorithms, Salp swarm algorithm (SSA), PSO, GWO, SVM, KNN, ML

Abstract:
A Distributed Denial of Service (DDoS) attack occurs when an attacker tries to disrupt a network, service or website by flooding huge numbers of packets on the internet traffic. Detecting DDoS attacks serves the goal of spotting and addressing them promptly to reduce their effects on the network, system or service being targeted. Detecting Distributed Denial of Service (DDoS) attacks is crucial, for people, companies and network managers. The detection of DDoS attacks has ranging uses in industries such as network security safeguarding websites, managing cloud services ensuring the security of online systems and services. Detecting DDoS attacks is essential for safeguarding infrastructure upholding service availability and guaranteeing the security of online systems and services. To achieve this objective, we proposed a framework to detect DDoS attacks including six steps. In step one, we start by gathering information, which includes network activity and system records, for operations as well as instances of DDoS attacks. Step two, we identify characteristics of the data collected such as patterns in network traffic, packet details, IP addresses, types of protocols used and more. Step three, we utilize algorithms for feature selection such as Salp Swarm Algorithm (SSA), Gray Wolf Algorithm (GWA), Particle Swarm Algorithm (PSO) to pinpoint the features that can distinguish between normal activities and DDoS attack patterns. After that in step four, we divide the processed dataset into sections for training and testing purposes to develop and assess the machine learning models such as SVM (support vector machine), and KNN (K-nearest neighbor). Step five we develop a classification model using machine learning techniques like decision trees, forests, support vector machines (SVM) logistic regression models or neural networks. Finally, we assess the effectiveness of models through metrics such as accuracy rates, precision levels, recall rates, and F1 scores. The results show that the proposed models achieve high results (99.9%). In summary detecting DDoS attacks is crucial for protecting networks, systems and online services against disruptions.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 4 | Views: 1310 | Reviews: 0

 
4.

Banks performance evaluation: A hybrid DEA-SVM- The case of U.S. agricultural banks Pages 107-120 Right click to download the paper Download PDF

Authors: Kekoura Sakouvogui

DOI: 10.5267/j.ac.2018.9.002

Keywords: Data envelopment analysis, DEA, Efficiency, Bank, SVM

Abstract:
Data Envelopment Analysis (DEA) is a well-known method used to measure the efficiency of decision making units. In this paper, we study the impact of the financial crisis while integrating DEA efficiency measures with Support Vector Machines (SVM). Moreover, to account for the heterogeneity effect in the efficiency measures, the gap statistical method of Tibshirani, et al., (2001) [Tibshirani, R., Walther, G., & Hastie, T. (2001). Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 63(2), 411-423.] is applied in order to achieve the optimal number of cluster. This study uses December quarterly panel data consisting of Farm Credit Agricultural Banks data from 2005 to 2016. We find strong evidence that the efficiency measures were stationary prior to the financial crisis (2005-2006), during the financial crisis (2007-2009) and post financial crisis (2010-2016). The results further show that the integrated DEA-SVM provide a lower performance during 2007-2009. Furthermore, the results show that the Agricultural banking sector was both efficient and stable over the period being analysed.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: AC | Year: 2019 | Volume: 5 | Issue: 3 | Views: 2056 | Reviews: 0

 

® 2010-2026 GrowingScience.Com