Search Results - (( changes optimization svm algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Forecasting FTSE Bursa Malaysia KLCI Trend with Hybrid Particle Swarm Optimization and Support Vector Machine Technique by Lee, Zhong Zhen, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah, Abraham, Ajith

    Published 2013
    “…The SVM algorithm uses the Radial Basis Function (RBF) kernel function and optim ization of the gam ma and large margin parameters are done using the PSO algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Sentiment analysis on COVID-19 outbreak using PSO-SVM / Amir Danial Shahrul Sazali by Shahrul Sazali, Amir Danial

    Published 2024
    “…The COVID-19 pandemic has had a huge influence on worldwide society, resulting in widespread lockdowns and considerable changes in everyday life. This project provides the analyzation of attitudes expressed in textual data connected to the COVID-19 outbreak using Particle Swarm Optimization with Support Vector Machines (SVM). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Prediction of photovoltaic system output using hybrid Cuckoo Search Least Square Support Vector Machine / Muhammad Aidil Adha Aziz by Aziz, Muhammad Aidil Adha

    Published 2019
    “…Therefore, Cuckoo Search Algorithm (CS) is hybrid with LS-SVM in order to optimize the RBF parameters for a better prediction performance. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer by Ravindran, Nadarajan

    Published 2023
    “…This algorithm named JAABC5ROC is the enhancement of Artificial Bee Colony (ABC) variant, JA-ABC5 by combining with Rate of Change (ROC)\. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  9. 9
  10. 10

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models by DERIB ASFAW, TILAHUN

    Published 2013
    “…Hence, the refill rank order performed according to the decrease order of the change of power production in the change of storage volume, while the order of depletion has been conducted with the increase order of the storage effectiveness ratio.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Reactive power planning for maximum load margin improvement using Fast Artificial Immune Support Vector Machine (FAISVM) by Aziz N.F.A., Abdul Rahman T.K., Zakaria Z.

    Published 2023
    “…The newly proposed algorithm can determine the optimal tap settings of tap changing transformers, the value of reactive power injection at the reactive power sources and the injection at the reactive power generator buses. …”
    Article
  17. 17

    Durian (Durio zibethinus) ripeness detection using thermal imaging with multivariate analysis by Mohd Ali, Maimunah, Hashim, Norhashila, Shahamshah, Muhammad Ikmal

    Published 2021
    “…Linear discriminant analysis (LDA), k-nearest neighbour (kNN), and support vector machine (SVM) were applied for the establishment of the optimal classification modelling algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20