Search Results - (( code classifications using algorithm ) OR ( loading optimization svm algorithm ))

Refine Results
  1. 1

    An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system by M. W., Mustafa, H., Shareef, M. H., Sulaiman, S. N., Abd. Khalid, S. R., Abd. Rahim, Omar, Aliman

    Published 2011
    “…The idea is to use GA as an optimizer to find the optimal values of hyper-parameters of LS-SVM and adopt a supervised learning approach to train the LS-SVM model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin by Mat Yasin, Zuhaila

    Published 2014
    “…On top of that, the multiobjective QIEP is also applied to determine the optimal undervoltage load shedding (UVLS) in various loading conditions according to load profile with and without DG. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Tracing the real power transfer of individual generators to loads using least squares support vector machine with continuous genetic algorithm by Mohd Wazir, Mustafa, Saifulnizam, Abd.Khalid, Mohd Herwan, Sulaiman, Siti Rafidah, Abd Rahim, Omar, Aliman, Shareef, Hussain

    Published 2011
    “…This paper attempts to trace the real power transfer of individual generators to loads in pool based power system by incorporating the hybridization of Least Squares Support Vector Machine (LS-SVM) with Continuous Genetic Algorithm (CGA)- CGA-LSSVM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…A prototype architecture and a user-friendly graphical interface tailored for SVM-based outbreak predictions are developed, accompanied by detailed code snippets elucidating essential steps in data loading, encoding, scaling, and SVM model training. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Reactive power planning for maximum load margin improvement using Fast Artificial Immune Support Vector Machine (FAISVM) by Aziz N.F.A., Abdul Rahman T.K., Zakaria Z.

    Published 2023
    “…FAISVM is a hybrid algorithm that incorporates the application of Artificial Immune System (AIS) and Support Vector Machine (SVM) in solving RPP problems. …”
    Article
  11. 11

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Fault classification in smart distribution network using support vector machine by Chuan O.W., Ab Aziz N.F., Yasin Z.M., Salim N.A., Wahab N.A.

    Published 2023
    “…Right setting parameters are important to learning results and generalization ability of SVM. Gaussian radial basis function (RBF) kernel function has been used for training of SVM to accomplish the most optimized classifier. …”
    Article
  16. 16
  17. 17

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…The algorithm experiments are carried out using the chain code representation created from previous research of the Centre of Excellence for Document Analysis and Recognition (CEDAR) dataset, which consists of 126 upper-case letter characters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article