Search Results - (( model validation bat algorithm ) OR ( user identification ((rsa algorithm) OR (_ algorithm)) ))
Search alternatives:
- user identification »
- validation bat »
- bat algorithm »
- rsa algorithm »
-
1
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…Secondly, two meta-heuristics, namely, Bi-Objective Gravitational Search Algorithm (BOGSA) and Bi-Objective Bat Algorithm (BOBAT), were combined to form a (BOGS-BAT) algorithm. …”
Get full text
Get full text
Thesis -
3
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper -
4
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
Get full text
Conference or Workshop Item -
5
-
6
A hybrid bat–swarm algorithm for optimizing dam and reservoir operation
Published 2019“…This study proposes a new hybrid optimization algorithm based on a bat algorithm (BA) and particle swarm optimization algorithm (PSOA) called the hybrid bat–swarm algorithm (HB-SA). …”
Get full text
Get full text
Article -
7
Application of augmented bat algorithm with artificial neural network in forecasting river inflow in Malaysia
Published 2024“…Only a few simulation systems, where previous techniques failed to anticipate SF data quickly, let alone cost-effectively, and took a long time to execute. The bat algorithm (BA), a meta-heuristic approach, was used in this study to optimize the weights and biases of the artificial neural network (ANN) model. …”
Article -
8
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…Thirdly, the thesis validates the algorithm's performance on standard constrained single objective and multi objective benchmark test functions. …”
Get full text
Get full text
Thesis -
9
-
10
Application of augmented bat algorithm with artificial neural network in forecasting river inflow of hydroelectric reservoir stations in Malaysia
Published 2023“…Uncertainty Analyses such as Taylor Diagram, Violin Plot, Relative Error, and Scatter Plot were applied to further validate the results. The Hybrid BA-ANN model proved to be versatile and robust when being applied to other study areas in Malaysia. …”
text::Thesis -
11
Investigation on the potential to integrate different artificial intelligence models with metaheuristic algorithms for improving river suspended sediment predictions
Published 2023“…Although the adaptive neuro fuzzy system (ANFIS) and multilayer feed-forward neural network (MFNN) have been widely used to simulate hydrological variables, improving the accuracy of the above models is an important issue for hydrologists. In this article, the ANFIS and MFNN models were improved by the bat algorithm (BA) and weed algorithm (WA). …”
Article -
12
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
13
Analysis the effectiveness of cryogenic treatment through roughness and temperature prediction using bonn technique / Manjunath.S and Ajay Kumar
Published 2017“…Thus, the bat algorithm coupled with artificial neural network is a dynamic and specific method in advancing the overall least possible method for surface roughness prediction in face milling operations.…”
Get full text
Get full text
Get full text
Article -
14
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
15
-
16
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation
Published 2022“…Thus, this research proposes optimization using the one of the latest nature inspired algorithm namely WOABAT-IFDO (Whale-Bat and Improved Fitness-Dependent Optimization) in the SFM interaction component. …”
Get full text
Get full text
Get full text
Proceeding -
19
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
20
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article
