Search Results - optimal ((((((cloud algorithm) OR (mining algorithm))) OR (tree algorithm))) OR (bat algorithm))
Search alternatives:
- mining algorithm »
- cloud algorithm »
- tree algorithm »
- bat algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Individual-tree segmentation and extraction based on LiDAR point cloud data
Published 2024“…In the task of individual tree extraction, the point cloud distance discriminant clustering algorithm outperformed the watershed algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Tree-based contrast subspace mining method
Published 2020“…Hence, this thesis presents the optimization of parameters values for the tree-based method by genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Task scheduling in cloud computing using Harris-Hawk Optimization
Published 2024“…In this study, the proposed HHO algorithm is simulated and compared with other well-known swarm intelligence algorithms, including Bat Algorithm (BA), Grey Wolf Optimization (GWO), and Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Get full text
Proceedings -
5
Optimizing Tree-Based Contrast Subspace Mining Using Genetic Algorithm
Published 2022“…This paper proposes a tree-based method which incorporates genetic algorithm to optimize the contrast subspace search by identifying global optima contrast subspace. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
7
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
Get full text
Conference or Workshop Item -
8
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…The three techniques with different planting lining direction lead to different number of trees, therefore the technique promotes the highest number of tree is optimal technique. …”
Get full text
Get full text
Conference or Workshop Item -
9
Evaluation of data mining models for predicting concrete strength
Published 2024“…The Particle Swarm Optimization algorithm is able to generate optimal values for the concrete features that maximizes the strength of concrete. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
11
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
12
Integrated approach using data mining-based decision tree and object-based image analysis for high-resolution urban mapping of WorldView-2 satellite sensor data
Published 2016“…Many features were explored by using a DM algorithm, which created the classification rules as a decision tree (DT) structure from the first study area. …”
Get full text
Get full text
Get full text
Article -
13
Enhanced dimensionality reduction methods for classifying malaria vector dataset using decision tree
Published 2021“…In this study, a novel optimized dimensionality reduction algorithm is proposed, by combining an optimized genetic algorithm with Principal Component Analysis and Independent Component Analysis (GA-O-PCA and GAO-ICA), which are used to identify an optimum subset and latent correlated features, respectively. …”
Get full text
Get full text
Get full text
Article -
14
Modeling forest fires risk using spatial decision tree
Published 2011Get full text
Get full text
Conference or Workshop Item -
15
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…In this context, proposing Forensic Examination and Analysis Methodology using Data mining (FED) and Forensic Examination and analysis methodology using Data mining and Optimization (FEDO) models address these issues. …”
Get full text
Get full text
Thesis -
16
Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset
Published 2020“…SVR however is inferior in accuracy and thus this paper discusses the usage of an optimized SVR with Evolved Bat Algorithm (EBA) to handle the missing value accurately with high execution time. …”
Get full text
Get full text
Article -
17
A direct ensemble classifier for imbalanced multiclass learning
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The experimental results show that predictive FDT algorithm can generate a relatively optimal tree without much computation effort (comprehensibility), and WFPRs have a better predictive accuracy of stock market time series data. …”
Get full text
Get full text
Article -
19
An improved bat algorithm with artificial neural networks for classification problems
Published 2016“…Recently, a new metaheuristic search Bat algorithm has become quite popular due its tendency towards convergence to optimal points in the search trajectory by using echo-location behavior of bats as its random walk. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…After that, SKF is tested to find the most accurate image template matching and compared with Particle Swarm Optimization (PSO) and Bat Algorithm with Mutation (BAM). …”
Get full text
Get full text
Thesis
