Search Results - (( data classification bat algorithm ) OR ( java general function algorithm ))
Search alternatives:
- data classification »
- classification bat »
- function algorithm »
- general function »
- bat algorithm »
- java general »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
-
3
Naive bayes-guided bat algorithm for feature selection.
Published 2013“…Bio-inspired method called Bat Algorithm hybridized with a Naive Bayes classifier has been presented in this work. …”
Get full text
Get full text
Article -
4
Naive Bayes-guided bat algorithm for feature selection
Published 2023“…Bio-inspired method called Bat Algorithm hybridized with a Naive Bayes classifier has been presented in this work. …”
Article -
5
An improve unsupervised discretization using optimization algorithms for classification problems
Published 2024“…Recognizing the critical role of discretization in enhancing classification performance, the study integrates equal width binning (EWB) with two optimization algorithms: the bat algorithm (BA), referred to as EB, and the whale optimization algorithm (WOA), denoted as EW. …”
Get full text
Get full text
Get full text
Article -
6
An improve unsupervised discretization using optimization algorithms for classification problems
Published 2024“…Recognizing the critical role of discretization in enhancing classification performance, the study integrates equal width binning (EWB) with two optimization algorithms: the bat algorithm (BA), referred to as EB, and the whale optimization algorithm (WOA), denoted as EW. …”
Get full text
Get full text
Get full text
Article -
7
New modified controlled bat algorithm for numerical optimization problem
Published 2022“…The MCBA-NN algorithm may be used effectively for data classification and statistical problems in the future.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Major problems in classification task are large amount of training data, large number of features and different behavior of data streams that reduce accuracy and increase computational cost in classifier training phase. …”
Get full text
Get full text
Thesis -
9
A Toolkit for Simulation of Desktop Grid Environment
Published 2014Get full text
Get full text
Final Year Project -
10
Real-time algorithmic music composition application.
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Application of augmented bat algorithm with artificial neural network in forecasting river inflow of hydroelectric reservoir stations in Malaysia
Published 2023“…As for R2, it is at 0.983 for the training data set and R2 of 0.948 for the testing data set of the hybrid model, compared to 0.955 and 0.932 for traing and testing data set of ANN standalone. …”
text::Thesis -
12
-
13
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008Get full text
Get full text
Conference or Workshop Item -
14
Visdom: Smart guide robot for visually impaired people
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
-
17
Evolutionary Music; Composing Beats and Chords Progression
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Smart student timetable planner
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…In the development phase, the dataset is pre-processed before the modeling process is done using YOLOv8, and deployed on Android platforms using Java and Kotlin languages in Android Studio. Functionality testing and accuracy testing have been conducted. …”
Get full text
Get full text
Get full text
Article -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…To improve the users’ memorability, the upload background picture function and cued colour scheme were proposed for the BPG system; the grid line scaling function and the loose authentication method were proposed for the enhanced BPG system; and the chronological story-based cued recall technique was proposed for the VIP Pro system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
