Search Results - (( storage optimization bat algorithm ) OR ( user identification search algorithm ))
Search alternatives:
- identification search »
- storage optimization »
- user identification »
- optimization bat »
- bat algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Assessment of energy storage and renewable energy sources-based two-area microgrid system using optimized fractional order controllers
Published 2024“…Simulation results reveal that the AOA-based CFOID-FOPIDN outperforms other existing algorithms, such as particle swarm optimization (PSO), bat algorithm (BAT), moth flame optimization (MFO), and whale optimization algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. A search intention consists of entity nodes and predicate nodes of XML data. …”
Get full text
Get full text
Conference or Workshop Item -
4
Frequency stabilization in interconnected power system using bat and harmony search algorithm with coordinated controllers
Published 2021“…To enhance the outcome of the proposed 2DOF–TIDN controller, its gain parameters are optimized with the use of a newly designed hybrid bat algorithm-harmony search algorithm (hybrid BA–HSA) technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
Get full text
Get full text
Get full text
Thesis -
6
Multi-Objective Optimal Energy Management of Nanogrid Using Improved Pelican Optimization Algorithm
Published 2025“…In order to demonstrate the effectiveness of the proposed algorithm, The outcomes of the simulation are juxtaposed with results obtained from the initial Pelican Optimisation Algorithm (POA), the Bat Algorithm, and the Improved Differential Evolutionary (IDE) Algorithm. …”
Article -
7
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
8
-
9
-
10
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In addition, it provides an input tool for user�s search preferences. The second component is the search process that is operated by a pattern matching. …”
Article -
11
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
12
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
13
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…However, due to information overload, some search engines are still incapable of returning only the most relevant documents to the users. …”
Get full text
Get full text
Get full text
Thesis -
14
Effective keyword query structuring using NER for XML retrieval
Published 2015“…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
Get full text
Get full text
Article -
15
Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems
Published 2013Get full text
Get full text
Get full text
Citation Index Journal -
16
An improved framework for content-based spamdexing detection
Published 2020“…This article is an attempt in that direction, where a framework has been proposed for spam web pages identification. The framework uses Stop words, Keywords Density, Spam Keywords Database, Part of Speech (POS) ratio, and Copied Content algorithms. …”
Get full text
Get full text
Get full text
Article -
17
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
19
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
20
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. …”
Get full text
Get full text
Article
