Search Results - (( loading optimization svm algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- loading optimization »
- optimization svm »
- validation using »
- java validation »
- using algorithm »
- svm algorithm »
-
1
An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system
Published 2011“…The idea is to use GA as an optimizer to find the optimal values of hyper-parameters of LS-SVM and adopt a supervised learning approach to train the LS-SVM model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin
Published 2014“…On top of that, the multiobjective QIEP is also applied to determine the optimal undervoltage load shedding (UVLS) in various loading conditions according to load profile with and without DG. …”
Get full text
Get full text
Thesis -
5
-
6
Tracing the real power transfer of individual generators to loads using least squares support vector machine with continuous genetic algorithm
Published 2011“…This paper attempts to trace the real power transfer of individual generators to loads in pool based power system by incorporating the hybridization of Least Squares Support Vector Machine (LS-SVM) with Continuous Genetic Algorithm (CGA)- CGA-LSSVM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…A prototype architecture and a user-friendly graphical interface tailored for SVM-based outbreak predictions are developed, accompanied by detailed code snippets elucidating essential steps in data loading, encoding, scaling, and SVM model training. …”
Get full text
Get full text
Thesis -
8
Reactive power planning for maximum load margin improvement using Fast Artificial Immune Support Vector Machine (FAISVM)
Published 2023“…FAISVM is a hybrid algorithm that incorporates the application of Artificial Immune System (AIS) and Support Vector Machine (SVM) in solving RPP problems. …”
Article -
9
Fault classification in smart distribution network using support vector machine
Published 2023“…Right setting parameters are important to learning results and generalization ability of SVM. Gaussian radial basis function (RBF) kernel function has been used for training of SVM to accomplish the most optimized classifier. …”
Article -
10
Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification
Published 2019“…After that, the simulation results were validated in the Load Test, and it shows that structure made from PLA material was able to withstand load with 1.7kg while the structure made from ABS material is only able to withstand load with 1.6kg. …”
Get full text
Get full text
Thesis -
11
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
12
Modeling and implementation of space vector modulation for three-phase direct torque control matrix converter
Published 2013“…The duty cycles of the switches are modeled using SVM for 0.65 voltage transfer ratios. The mathematical models for the proposed systems are implemented by using Matlab/Simulink for different speed and load. …”
Get full text
Get full text
Thesis -
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
14
Hybrid ANN and Artificial Cooperative Search Algorithm to Forecast Short-Term Electricity Price in De-Regulated Electricity Market
Published 2019“…Finally, the simulation results validated the premise of the proposed hybrid method through enhanced accuracy compared to the results acquired by implementing hybrid support vector machine (SVM) and hybrid ANN optimization methods. © 2013 IEEE.…”
Get full text
Get full text
Article -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
16
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Specific heat capacity extraction of soybean oil/mxene nanofluids using optimized long short-term memory
Published 2024“…In comparison, 5% is used for testing and validation purposes of the developed algorithm. The newly proposed optimized SVR, GMDH, MLP, and LSTM are modelled in MATLAB software. …”
Get full text
Get full text
Get full text
Article -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
19
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
20
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
