Showing 1 - 11 results of 11 for search '(( primary aim model optimization algorithm ) OR ( binary data process optimization algorithm ))*', query time: 0.10s Refine Results
  1. 1

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…In this study, features were extracted from signals in time, frequency, and time–frequency domains. The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  2. 2
  3. 3

    Multiclass feature selection with metaheuristic optimization algorithms: a review by Abu Zitar, Raed

    Published 2022
    “…The feature selection problem aims at reducing the feature set dimension while maintaining the performance model accuracy. …”
    Get full text
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas by Marwan Dhuheir (19170898)

    Published 2024
    “…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …”
  10. 10

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …”
  11. 11

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …”