Search Results - (( storage optimization svm algorithm ) OR ( java application window algorithm ))
Search alternatives:
- storage optimization »
- application window »
- optimization svm »
- java application »
- window algorithm »
- svm algorithm »
-
1
A modified weighted support vector machine (WSVM) to reduce noise data in classification problem
Published 2021“…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A modified weighted support vector machine (WSVM) to reduce noise data in classification problem
Published 2021“…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models
Published 2013“…Hence, the refill rank order performed according to the decrease order of the change of power production in the change of storage volume, while the order of depletion has been conducted with the increase order of the storage effectiveness ratio.…”
Get full text
Get full text
Thesis -
4
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
5
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
6
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
Article -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
