Search Results - (( java application a algorithm ) OR ( based evaluation ((method algorithm) OR (bat algorithm)) ))
Search alternatives:
- java application »
- based evaluation »
- method algorithm »
- application a »
- bat algorithm »
- a algorithm »
-
1
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The aim of the research is to introduce novel form of swarm intelligence algorithms based on real echolocation behaviour of bats. …”
Get full text
Get full text
Thesis -
2
The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction
Published 2023“…Experiments show that the T-method prediction accuracy with the Binary Bat algorithm based on the Great Value Priority binarization scheme is better than that of the conventional T-method-orthogonal array. � 2022, Prince of Songkla University. …”
Article -
3
Taguchi's T-method with nearest integer-based binary bat algorithm for prediction
Published 2023“…In this paper, a swarm-based binary bat optimization algorithm with a nearest integer discretization approach is integrated with the Taguchi�s T-method. …”
Article -
4
Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm
Published 2018“…Design of hydraulic structures, flood warning systems, evacuation measures, and traffic management require river flood routing. A common hydrologic method of flood routing is the Muskingum method. The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
Get full text
Get full text
Article -
5
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer
Published 2019“…The algorithm is validated based on 36 unconstrained benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
Get full text
Get full text
Get full text
Thesis -
10
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
12
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
13
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Solving large-scale problems using multi-swarm particle swarm approach
Published 2018“…In the simulation part, several benchmark functions were performed with different numbers of dimensions. The proposed algorithm was tested on several test functions, with four different number of dimensions (100, 500, and 1000) it was evaluated in terms of performance efficiency and compared to standard PSO (SPSO), and mastersalve PSO algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…It adopts a population-based and local search algorithm to exploit the advantages of bats’ echolocation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Opposition-Based Quantum Bat Algorithm to Eliminate Lower-Order Harmonics of Multilevel Inverters
Published 2021“…This study proposes an opposition-based quantum bat algorithm (OQBA) to determine these optimum switching angles. …”
Get full text
Get full text
Article -
18
Opposition-Based Quantum Bat Algorithm to Eliminate Lower-Order Harmonics of Multilevel Inverters
Published 2021“…This study proposes an opposition-based quantum bat algorithm (OQBA) to determine these optimum switching angles. …”
Get full text
Get full text
Article -
19
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise
