Search Results - ((((((svm algorithm) OR (system algorithm))) OR (based algorithm))) OR (bat algorithm))
Search alternatives:
- system algorithm »
- svm algorithm »
- bat algorithm »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
2
-
3
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
4
Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy
Published 2023“…Decision making; Natural language processing systems; Bat algorithms; Heading policy; Multi-reservoir operation; Multi-reservoir systems; Optimization algorithms; Power- generations; Salp swarms; Seagull optimization algorithm; Swarm algorithms; Two-point; Optimization…”
Article -
5
-
6
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…It adopts a population-based and local search algorithm to exploit the advantages of bats’ echolocation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
8
HEURISTIC OPTIMIZATION OF BAT ALGORITHM FOR HETEROGENEOUS SWARMS USING PERCEPTION
Published 2023“…The Bat Algorithm is a population-based meta-heuristic algorithm for solving continuous optimization problems. …”
Get full text
Get full text
Article -
9
A hybrid bat�swarm algorithm for optimizing dam and reservoir operation
Published 2023“…Dams; Irrigation; Particle swarm optimization (PSO); Bat algorithms; Global optimal solutions; Hybrid optimization algorithm; Multi-reservoir systems; Optimization algorithms; Optimization modeling; Particle swarm optimization algorithm; Reservoir operation; Reservoirs (water)…”
Article -
10
A hybrid bat–swarm algorithm for optimizing dam and reservoir operation
Published 2019“…This study proposes a new hybrid optimization algorithm based on a bat algorithm (BA) and particle swarm optimization algorithm (PSOA) called the hybrid bat–swarm algorithm (HB-SA). …”
Get full text
Get full text
Article -
11
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025Subjects:Conference paper -
12
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
13
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
14
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…For the improvement of task allocation, several load balancing techniques are introduced in a cloud but stills the system failure occurs. Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Opposition-Based Learning Binary Bat Algorithm as Feature Selection Approach in Taguchi's T-Method
Published 2024Subjects: “…Binary Bat Algorithm…”
Conference Paper -
16
Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy
Published 2021“…The Seagull Optimization Algorithm was subsequently benchmarked against the Salp Swarm Algorithm (SSA), Bat Algorithm (BA) and the Shark Optimization Algorithm (SOA). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A Navigation Strategy for Swarm Robotics Based on Bat Algorithm Optimization Technique
Published 2018“…This paper aims to adapt Bat Algorithm (BA) optimization techniques to the swarm robotics system. …”
Get full text
Get full text
Conference or Workshop Item -
19
An Interaction Strategy for Testing Software Product Lines using the Bat-inspired Algorithm
Published 2015“…In line with the recent emergence of Search based Software Engineering (SBSE), this article presents a novel strategy for SPLs tests reduction using Bat-inspired algorithm (BA), called SPLBA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article
