Search Results - (( java application modified algorithm ) OR ( parameter classification bat algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…The study of Bat Algorithm is achieved the purpose of this research. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli by Ramli, Muhammad Harith

    Published 2017
    “…Bat algorithm is chosen for the development of the prototype for segmentation and classification purpose. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Experimental results of the EBGWO algorithm on the NSL-KDD dataset in terms of number of selected features and classification accuracy are superior to other benchmark optimisation algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Application of augmented bat algorithm with artificial neural network in forecasting river inflow of hydroelectric reservoir stations in Malaysia by Joe Wee Wei, Mr.

    Published 2023
    “…However, standalone models, such as Artificial Neural Network (ANN), typically underperform during local convergence and resulted in slow-speed convergence. Thus, Bat Algorithm (BA) was used to enhance the efficiency of ANN in forecasting upstream river SF, as BA is capable of switching from the “explore to exploit” function which could increase the rate of convergence at the initial stage and deliver a quick result for a majority of a classification problem. …”
    text::Thesis
  5. 5
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9