Search Results - (( user evaluation force algorithm ) OR ( whale optimization bat algorithm ))

Refine Results
  1. 1
  2. 2

    A novel nonlinear time‑varying sigmoid transfer function in binary whale optimization algorithm for descriptors selection in drug classifcation by Mohd Yusof, Norfadzlia, Muda, Azah Kamilah, Pratama, Satrya Fajri, Abraham, Ajith

    Published 2022
    “…In computational chemistry, the high-dimensional molecular descriptors contribute to the curse of dimensionality issue. Binary whale optimization algorithm (BWOA) is a recently proposed metaheuristic optimization algorithm that has been efficiently applied in feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Metaheuristic Algorithms and Neural Networks in Hydrology

    Published 2024
    “…It starts with the introduction of ANNs as a black box model, followed by the coupling of various metaheuristic algorithms with ANNs to form novel neural network models for solving real-world problems in hydrology, including Particle Swarm Optimization (PSO) for rainfall-runoff modeling, Bat Optimization (Bat) and Cuckoo Search Optimization (CSO) for future rainfall prediction, the Whale Optimization Algorithm (WOA) and Salp Swarm Optimization (SSO) for future water level prediction, Grey Wolf Optimization (GWO), Multi-Verse Optimization (MVO), the Sine Cosine Algorithm (SCA) and the Hybrid Sine Cosine and Fitness Dependent Optimizer (SC-FDO) for imputing missing rainfall data.…”
    Get full text
    Get full text
    Get full text
    Book
  4. 4

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…This paper proposes a new hybrid of nature inspired optimization algorithm (IFDO-WOABAT) based on the latest optimization algorithm namely Improved Fitness Dependent Optimization (IFDO) with Whale-Bat Optimization algorithm (WOABAT). …”
    Get full text
    Get full text
    Get full text
    Proceeding
  5. 5

    An improve unsupervised discretization using optimization algorithms for classification problems by Mohamed, Rozlini, Samsudin, Noor Azah

    Published 2024
    “…Recognizing the critical role of discretization in enhancing classification performance, the study integrates equal width binning (EWB) with two optimization algorithms: the bat algorithm (BA), referred to as EB, and the whale optimization algorithm (WOA), denoted as EW. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An improve unsupervised discretization using optimization algorithms for classification problems by Mohamed, Rozlini, Samsudin, Noor Azah

    Published 2024
    “…Recognizing the critical role of discretization in enhancing classification performance, the study integrates equal width binning (EWB) with two optimization algorithms: the bat algorithm (BA), referred to as EB, and the whale optimization algorithm (WOA), denoted as EW. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Assessment of energy storage and renewable energy sources-based two-area microgrid system using optimized fractional order controllers by Peddakapu, K., Mohd Rusllim, Mohamed, Srinivasarao, P., Arya, Yogendra

    Published 2024
    “…Simulation results reveal that the AOA-based CFOID-FOPIDN outperforms other existing algorithms, such as particle swarm optimization (PSO), bat algorithm (BAT), moth flame optimization (MFO), and whale optimization algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2022
    “…Thus, this research proposes optimization using the one of the latest nature inspired algorithm namely WOABAT-IFDO (Whale-Bat and Improved Fitness-Dependent Optimization) in the SFM interaction component. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  10. 10

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…All these achieved because the proposed algorithm targets those users located at the cluster borders who more likely cause rank deficiency. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Securing graphical user password using multi-grid technique from shoulder surfing attack / Leila Ghasemi Sabet by Sabet, Leila Ghasemi

    Published 2010
    “…For security in graphical password, there are some attacks such as shoulder surfing, and brute force. Shoulder surfing is one of the major attacks; it means this project must cover the shoulder surfing attacks for making the algorithms more secure. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm by Abdul Haris, Faranadia

    Published 2021
    “…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis
  20. 20