Search Results - (( using (vectorisation OR vectorization) bees algorithm ) OR ( java detection using algorithm ))

Refine Results
  1. 1
  2. 2

    Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction by Zuriani, Mustaffa

    Published 2014
    “…This study proposed a hybrid algorithm, based on Artificial Bee Colony (ABC) and LSSVM, that consists of three algorithms; ABC-LSSVM, lvABC-LSSVM and cmABC-LSSVM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Lévy mutation in artificial bee colony algorithm for gasoline price prediction by Mustaffa, Zuriani, Yusof, Yuhanis

    Published 2012
    “…In this paper, a mutation strategy that is based on Lévy Probabily Distribution is introduced in Artificial Bee Colony algorithm. The purpose is to better exploit promising solutions found by the bees.Such an approach is used to improve the performance of the original ABC in optimizing Least Squares Support Vector Machine hyper parameters.From the conducted experiment, the proposed lvABC shows encouraging results in optimizing parameters of interest.The proposed.lvABC-LSSVM has outperformed existing prediction model, Backpropogation Neural Network (BPNN), in predicting gasoline price.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…Support Vector Machine and Naïve Bayes classifiers were used as a fitness function for the ABC algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhanced artificial bee colony for training least squares support vector machines in commodity price forecasting by Mustaffa, Zuriani, Yusof, Yuhanis, Kamaruddin, Siti Sakira

    Published 2014
    “…By using commodities prices time series as empirical data, the proposed technique is compared against two techniques, including Back Propagation Neural Network and by Genetic Algorithm.Empirical results show the capability of the proposed technique in producing higher prediction accuracy for the prices of interested time series data.…”
    Get full text
    Get full text
    Article
  8. 8

    Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network by Tareq, M., Abed, S.A., Sundararajan, E.A.

    Published 2019
    “…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer by Ravindran, Nadarajan

    Published 2023
    “…This algorithm named JAABC5ROC is the enhancement of Artificial Bee Colony (ABC) variant, JA-ABC5 by combining with Rate of Change (ROC)\. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    LSSVM parameters tuning with enhanced artificial bee colony by Mustaffa, Zuriani, Yusof, Yuhanis

    Published 2014
    “…To guarantee its convincing performance, it is crucial to select an appropriate technique in order to obtain the optimized hyper-parameters of LSSVM algorithm.In this paper, an Enhanced Artificial Bee Colony (eABC) is used to obtain the ideal value of LSSVM’s hyper parameters, which are regularization parameter, γ and kernel parameter, σ2.Later, LSSVM is used as the prediction model. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis