Search Results - (( developing program svm algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1
  2. 2

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Lightning fault classification for transmission line using support vector machine by Asman, Saidatul Habsah, Ab Aziz, Nur Fadilah, Ab Kadir, Mohd Zainal Abidin, Ungku Amirulddin, Ungku Anisa, Roslan, Nurzanariah, Elsanabary, Ahmed

    Published 2023
    “…The proposed method was implemented in the MATLAB/SIMULINK programming platform. The classification performance of the developed algorithms was evaluated using confusion matrix. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Lightning Fault Classification for Transmission Line Using Support Vector Machine by Asman S.H., Aziz N.F.A., Kadir M.Z.A.A., Amirulddin U.A.U., Roslan N., Elsanabary A.

    Published 2024
    “…The proposed method was implemented in the MATLAB/SIMULINK programming platform. The classification performance of the developed algorithms was evaluated using confusion matrix. …”
    Conference Paper
  5. 5
  6. 6

    Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin by Mat Yasin, Zuhaila

    Published 2014
    “…Later, a Least-Squares Support Vector Machine (LS-SVM) model was developed using cross-validation technique. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Classification models for higher learning scholarship award decisions by Wirawati Dewi Ahmad, Azuraliza Abu Bakar

    Published 2018
    “…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…Multilayer Perceptron algorithm has been the best algorithm with the highest success percentage in both of the programs; Decision Trees has been the algorithm which has the lowest success percentage again in both of the programs. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…The Smooth Support Vector Machine (SSVM) is a further development of the SVM. Smoothing methods, extensively used for solving important mathematical programming problems and applications. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…VSCI was used as the indicator for the MLP of load buses. Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19
  20. 20

    A new technique for maximum load margin estimation and prediction by Aziz N.F.A., Rahman T.K.A., Yasin Z.M., Zakaria Z.

    Published 2023
    “…In addition, FAISVM is another new hybrid technique developed for maximum load margin prediction that integrates the application of FAIS and Support Vector Machine (SVM). …”
    Article