Search Results - (( java implementation level algorithm ) OR ( parameter evaluation bat algorithm ))
Search alternatives:
- implementation level »
- parameter evaluation »
- java implementation »
- level algorithm »
- evaluation bat »
- bat algorithm »
-
1
A study on the parameter selection of bat algorithm in in optimizing parameters in camera auto calibration problem
Published 2022“…Each bat in the Bat Algorithm represents a potential solution to the issue, and each dimension in the Bat Algorithm's search space represents one of the basic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Get full text
Article -
2
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Conference or Workshop Item -
3
A Hybrid Least Squares Support Vector Machine with Bat and Cuckoo Search Algorithms for Time Series Forecasting
Published 2020“…Evaluation was performed separately to further analyze the strength of Bat and Cuckoo Search to optimize LSSVM parameters. …”
Get full text
Get full text
Article -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…The purpose of this research is to apply and evaluate the performance of Bat Algorithm for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…Experimental and statistical analyses show that, in comparison with the bat as well as variants of the bat and state-of-the-art algorithms, the proposed algorithm substantially outperforms them significantly, based on MSE and BER.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
9
Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm
Published 2018“…The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
Get full text
Get full text
Article -
10
Bat algorithm and neural network for monthly streamflow prediction
Published 2023“…Therefore, this study proposed on the development of streamflow prediction model AI techniques namely Bat algorithm (BA) and backpropagation neural network (BPNN). …”
Conference Paper -
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
13
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
14
Comparison of mabsa, PSO and GWO of PI-PD controller for dc motor
Published 2024“…The swarm intelligence group selected Particle Swarm Optimization (PSO), Grey Wolf Optimization (GWO), and Modified Adaptive Bats Sonar Algorithms (MABSA) to optimize the parameters of the PI-PD controller. …”
Get full text
Get full text
Thesis -
15
Support vector machine and neural network based model for monthly stream flow forecasting
Published 2023“…Two performance evaluation measure, root mean square error (RMSE) and coefficient of determination (R 2 ) were employed to evaluate the performance of developed forecasting model. …”
Article -
16
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
17
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The EBGWO algorithm was evaluated on NSL-KDD and six (6) benchmark datasets from the University California Irvine (UCI) repository against ten (10) benchmark metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
20
