Search Results - (( loading optimization svm algorithm ) OR ( java detection method algorithm ))

Refine Results
  1. 1

    An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system by M. W., Mustafa, H., Shareef, M. H., Sulaiman, S. N., Abd. Khalid, S. R., Abd. Rahim, Omar, Aliman

    Published 2011
    “…The idea is to use GA as an optimizer to find the optimal values of hyper-parameters of LS-SVM and adopt a supervised learning approach to train the LS-SVM model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin by Mat Yasin, Zuhaila

    Published 2014
    “…On top of that, the multiobjective QIEP is also applied to determine the optimal undervoltage load shedding (UVLS) in various loading conditions according to load profile with and without DG. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Tracing the real power transfer of individual generators to loads using least squares support vector machine with continuous genetic algorithm by Mohd Wazir, Mustafa, Saifulnizam, Abd.Khalid, Mohd Herwan, Sulaiman, Siti Rafidah, Abd Rahim, Omar, Aliman, Shareef, Hussain

    Published 2011
    “…This paper attempts to trace the real power transfer of individual generators to loads in pool based power system by incorporating the hybridization of Least Squares Support Vector Machine (LS-SVM) with Continuous Genetic Algorithm (CGA)- CGA-LSSVM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…A prototype architecture and a user-friendly graphical interface tailored for SVM-based outbreak predictions are developed, accompanied by detailed code snippets elucidating essential steps in data loading, encoding, scaling, and SVM model training. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Reactive power planning for maximum load margin improvement using Fast Artificial Immune Support Vector Machine (FAISVM) by Aziz N.F.A., Abdul Rahman T.K., Zakaria Z.

    Published 2023
    “…FAISVM is a hybrid algorithm that incorporates the application of Artificial Immune System (AIS) and Support Vector Machine (SVM) in solving RPP problems. …”
    Article
  10. 10

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fault classification in smart distribution network using support vector machine by Chuan O.W., Ab Aziz N.F., Yasin Z.M., Salim N.A., Wahab N.A.

    Published 2023
    “…Right setting parameters are important to learning results and generalization ability of SVM. Gaussian radial basis function (RBF) kernel function has been used for training of SVM to accomplish the most optimized classifier. …”
    Article
  13. 13

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…After that, the simulation results were validated in the Load Test, and it shows that structure made from PLA material was able to withstand load with 1.7kg while the structure made from ABS material is only able to withstand load with 1.6kg. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Modeling and implementation of space vector modulation for three-phase direct torque control matrix converter by Ruzlaini, Ghoni

    Published 2013
    “…The duty cycles of the switches are modeled using SVM for 0.65 voltage transfer ratios. The mathematical models for the proposed systems are implemented by using Matlab/Simulink for different speed and load. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Hybrid ANN and Artificial Cooperative Search Algorithm to Forecast Short-Term Electricity Price in De-Regulated Electricity Market by Pourdaryaei, Alireza, Mokhlis, Hazlie, Illias, Hazlee Azil, Kaboli, S. Hr. Aghay, Ahmad, Shameem, Ang, Swee Peng

    Published 2019
    “…Finally, the simulation results validated the premise of the proposed hybrid method through enhanced accuracy compared to the results acquired by implementing hybrid support vector machine (SVM) and hybrid ANN optimization methods. © 2013 IEEE.…”
    Get full text
    Get full text
    Article