Search Results - (( parameter estimation bat algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Improving the Muskingum flood routing method using a hybrid of particle swarm optimization and bat algorithm by Ehteram M., Othman F.B., Yaseen Z.M., Afan H.A., Allawi M.F., Malek M.B.A., Ahmed A.N., Shahid S., Singh V.P., El-Shafie A.

    Published 2023
    “…Decision making; Disaster prevention; Floods; Routing algorithms; Water resources; Absolute deviations; Bat algorithms; Comparative analysis; Computational time; Flood routing; Muskingum models; Particle swarm optimization algorithm; Swarm algorithms; Particle swarm optimization (PSO); accuracy assessment; algorithm; comparative study; decision making; flood; flood forecasting; flood routing; numerical method; optimization; parameter estimation; water resource; United Kingdom; United States…”
    Article
  2. 2

    Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm by Farzin, Saeed, Singh, Vijay, Karami, Hojat, Farahani, Nazanin, Ehteram, Mohammad, Kisi, Ozgur, Allawi, Mohammed Falah, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2018
    “…The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10