Search Results - binary ((((((tree algorithm) OR (bat algorithm))) OR (_ algorithm))) OR (based algorithm))
Search alternatives:
- tree algorithm »
-
1
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025Subjects:Conference paper -
2
Opposition-Based Learning Binary Bat Algorithm as Feature Selection Approach in Taguchi's T-Method
Published 2024Subjects: “…Binary Bat Algorithm…”
Conference Paper -
3
The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction
Published 2023“…This paper proposes an optimization algorithm based on the Binary Bat algorithm methodology for replacing the conventional orthogonal array approach. …”
Article -
4
Genetic algorithms for VLSI micro-Cell layout area optimization based on binary tree
Published 2009Subjects: Get full text
Working Paper -
5
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis -
6
Guidance system based on Dijkstra-ant colony algorithm with binary search tree for indoor parking system
Published 2021“…In this paper, the Dijkstra-ant colony algorithm (ACO) with binary search tree (BST) has been proposed. …”
Get full text
Get full text
Get full text
Article -
7
A novel nonlinear time‑varying sigmoid transfer function in binary whale optimization algorithm for descriptors selection in drug classifcation
Published 2022“…The comparative optimization algorithms include two BWOA variants, binary bat algorithm (BBA), binary gray wolf algorithm (BGWOA), and binary manta-ray foraging algorithm (BMRFO). …”
Get full text
Get full text
Get full text
Article -
8
Hybrid bat algorithm for minimum dominating set problem
Published 2017“…This method uses population-based approach called bat algorithm (BA) which explore a wide area of the search space, thus it is capable in the diversification procedure. …”
Get full text
Get full text
Article -
9
Taguchi's T-method with nearest integer-based binary bat algorithm for prediction
Published 2023“…In this paper, a swarm-based binary bat optimization algorithm with a nearest integer discretization approach is integrated with the Taguchi�s T-method. …”
Article -
10
-
11
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
12
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
13
Window based personalized time management system
Published 2012“…The time management system is being widely used to manage time effectively.This paper presents on how window-based personalized time management system will be developed according to user’s need.Besides that,this paper will discuss on two(2)types of searching algorithm which are Binary Search Tree (BST) and Hashing Algorithm.The algorithms were tested and the one with better performance in terms of speed was implemented in this project.Through this system, users could manage their time in a simple and effective manner.…”
Get full text
Get full text
Undergraduates Project Papers -
14
An efficient model for indoor radio signal prediction and coverage estimation / Md. Sumon Sarker
Published 2011“…In this regards, this study explores two algorithms. The first algorithm is an efficient and faster ray-tracing technique based on binary angle division for radio signal prediction in indoor environment. …”
Get full text
Get full text
Thesis -
15
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
Get full text
Get full text
Conference or Workshop Item -
16
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Another quantum algorithm for a minimum weight spanning tree in the graph was also designed. …”
Get full text
Get full text
Thesis -
19
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008“…Three different types of genetic algorithms: simple genetic algorithm (SGA), steady-state algorithm (SSGA) and adaptive genetic algorithm (AGA) are employed in order to examine their performances in converging to their global minimums. …”
Get full text
Get full text
Conference or Workshop Item -
20
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…Traditional machine learning algorithms, such as Decision Trees, Naive Bayes, Random Forest, Random Trees, Multi-Layer Perceptron, and Support Vector Machines, have been extensively applied to address these threats. …”
Get full text
Get full text
Get full text
Thesis
