Search Results - (( model validation bat algorithm ) OR ( set detection based algorithm ))*
Search alternatives:
- detection based »
- validation bat »
- bat algorithm »
- set detection »
-
1
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…Secondly, two meta-heuristics, namely, Bi-Objective Gravitational Search Algorithm (BOGSA) and Bi-Objective Bat Algorithm (BOBAT), were combined to form a (BOGS-BAT) algorithm. …”
Get full text
Get full text
Thesis -
2
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper -
3
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
Get full text
Conference or Workshop Item -
4
-
5
A hybrid bat–swarm algorithm for optimizing dam and reservoir operation
Published 2019“…This study proposes a new hybrid optimization algorithm based on a bat algorithm (BA) and particle swarm optimization algorithm (PSOA) called the hybrid bat–swarm algorithm (HB-SA). …”
Get full text
Get full text
Article -
6
Application of augmented bat algorithm with artificial neural network in forecasting river inflow in Malaysia
Published 2024“…Only a few simulation systems, where previous techniques failed to anticipate SF data quickly, let alone cost-effectively, and took a long time to execute. The bat algorithm (BA), a meta-heuristic approach, was used in this study to optimize the weights and biases of the artificial neural network (ANN) model. …”
Article -
7
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…Thirdly, the thesis validates the algorithm's performance on standard constrained single objective and multi objective benchmark test functions. …”
Get full text
Get full text
Thesis -
8
-
9
An algorithm for Elliott Waves pattern detection
Published 2018“…The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
Get full text
Get full text
Article -
10
An algorithm for Elliott Waves pattern detection
Published 2018“…The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
Get full text
Get full text
Article -
11
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Application of augmented bat algorithm with artificial neural network in forecasting river inflow of hydroelectric reservoir stations in Malaysia
Published 2023“…Uncertainty Analyses such as Taylor Diagram, Violin Plot, Relative Error, and Scatter Plot were applied to further validate the results. The Hybrid BA-ANN model proved to be versatile and robust when being applied to other study areas in Malaysia. …”
text::Thesis -
14
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
Published 2016“…It provides an algorithm to the discovery of error and duplicates entries in the data sets of existing data warehouse. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Automated intruder detection from image sequences using minimum volume sets
Published 2012“…We propose a new algorithm based on machine learning techniques for automatic intruder detection in visual surveillance networks. …”
Get full text
Get full text
Get full text
Article -
18
Investigation on the potential to integrate different artificial intelligence models with metaheuristic algorithms for improving river suspended sediment predictions
Published 2023“…Although the adaptive neuro fuzzy system (ANFIS) and multilayer feed-forward neural network (MFNN) have been widely used to simulate hydrological variables, improving the accuracy of the above models is an important issue for hydrologists. In this article, the ANFIS and MFNN models were improved by the bat algorithm (BA) and weed algorithm (WA). …”
Article -
19
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…TLSMalDetect includes periodicity-independent entropy-based flow set (EFS) features produced by an FFT technique. …”
Get full text
Get full text
Thesis -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…This approach that is according to the DNN model reduces irrelevant features in the intrusion detection data sets of CICIDS2017 to improve the accuracy and cluster high-scale data sets. …”
Get full text
Get full text
Thesis
