Search Results - (( java implementation svm algorithm ) OR ( programming point efficient algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING by ABDUL MALEK, NADHIRA

    Published 2011
    “…Event-driven programming method was applied in producing the maze navigation algorithm for the robot.…”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A combined filter line search and trust region method for nonlinear programming by Chin, Choong Ming, Halim, Abdul, Rashid, A. H. A., Nor, K. M.

    Published 2006
    “…Computational results on selected large scale CUTE problems on the prototype code fiILS are very encouraging and numerical performance with LOQO and SNOPT show that the algorithm is efficient and reliable.…”
    Get full text
    Article
  7. 7

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…The algorithm also shows its robustness because it does not require a good initial starting point. …”
    Get full text
    Get full text
    Article
  8. 8

    Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias by Alias, Mohd Haizilan

    Published 2007
    “…This problem can be compare by using both method of power flow, which remains well condition at the saddle node bifurcation point due to the convergence of load flow. The method of power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Design and implementation of real data fast fourier transform processor on field programmable gates array by Ahmed, Mohammed Kassim

    Published 2015
    “…In order to calculate the DFT efficiently, various FFT algorithms and architectures have been presented. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Parallel Block Methods for Solving Ordinary Differential Equations by Abdul Majid, Zanariah

    Published 2004
    “…Subsequently, a more structured and efficient algorithm comprising the block methods was constructed for solving systems of first order ODEs using variable step size and order. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An efficacious multi-objective fuzzy linear programming approach for optimal power flow considering distributed generation by Warid Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2016
    “…The multi-objective fuzzy optimal power flow (OPF) formulation was converted into a crisp OPF in a successive linear programming (SLP) framework and solved using an efficient interior point method (IPM). …”
    Get full text
    Get full text
    Article