Search Results - (( evolution optimization bat algorithm ) OR ( control optimization mining algorithm ))
Search alternatives:
- evolution optimization »
- control optimization »
- optimization bat »
- mining algorithm »
- bat algorithm »
-
1
Multi-Swarm bat algorithm
Published 2023“…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
Article -
2
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
3
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…The proposed algorithm in the retrieval phase showed optimal performance as compared to the baseline algorithms. …”
Get full text
Get full text
Thesis -
4
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
5
-
6
-
7
A novel approach to data mining using simplified swarm optimization
Published 2011“…In this thesis, a novel Simplified Swarm Optimization (SSO) algorithm is proposed as a rule-based classifier and for feature selection. …”
Get full text
Get full text
Thesis -
8
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
9
-
10
-
11
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Also, self-adaptive scaling factor and crossover probability control parameters are introduced to diminish time of finding an optimal parameter to produce the best population. …”
Get full text
Get full text
Thesis -
12
Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard
Published 2023“…This scheme revealed the optimal performance in terms of mining health data size, average response time, transaction latency, and throughput for secured block transactions in blockchain networks.…”
Get full text
Get full text
Get full text
Article -
13
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…Several conventional adaptive distance relay (ADR) and computational based intelligent modifications presented to solve the impending compromise by using faulted line voltage and current parameters for the various protection relay controller modification, optimizing synchronized measurement to block or limit the fault current penetration into the grid. …”
Get full text
Get full text
Thesis -
14
Blockchain-enabled cybersecurity framework for healthcare domain
Published 2025“…This framework revealed the optimal performance in terms of mining health data size, average response time, transaction latency, and throughput for secured block transactions in blockchain networks by doing a simulation-based comparative study with the existing work. …”
Get full text
Get full text
Thesis
