Search Results - (( java application among algorithm ) OR ( sequence optimization svm algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Development Of Vehicle Tracking And Counting System From Traffic Surveillance Video by Kueh , Chiung Lin

    Published 2015
    “…Visual Background Extractor (ViBE) is used to extract the vehicles (foreground) from the traffic surveillance video sequences. Simple tracking and counting algorithm is used to track and count the detected vehicle. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Time series data intelligent clustering algorithm for landslide displacement prediction by Han, Liu, Shang, Tao, Shu, Jisen, Khan Chowdhury, Ahmed Jalal

    Published 2018
    “…After embedding dimension processing, the time series of landslide displacement is predicted by SVM data mining model. Dynamic time warping calculation is based on the correlation of time series sequence and the components. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…SOM and K-Means are integrated as a clustering algorithm to produce a granular input, while SVM is then used as a classifier. …”
    Get full text
    Get full text
    Monograph
  6. 6
  7. 7

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Ensemble learning using multi-objective optimisation for arabic handwritten words by Ghadhban, Haitham Qutaiba

    Published 2021
    “…The features were tested with Support Vector Machine (SVM) and Extreme Learning Machine (ELM). This work improved due to the SI feature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
    Get full text
    Get full text
    Thesis
  20. 20