咨询与建议

限定检索结果

文献类型

  • 25 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36 篇 工学
    • 25 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 5 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 3 篇 石油与天然气工程
    • 3 篇 软件工程
    • 2 篇 仪器科学与技术
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 航空宇航科学与技...
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 农学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 37 篇 binary bat algor...
  • 7 篇 feature selectio...
  • 6 篇 bat algorithm
  • 5 篇 classification
  • 4 篇 svm
  • 3 篇 phasor measureme...
  • 3 篇 observability
  • 3 篇 evolutionary alg...
  • 2 篇 intrusion detect...
  • 2 篇 random forest
  • 2 篇 feature subset s...
  • 2 篇 optimization
  • 2 篇 information gain
  • 2 篇 quality of servi...
  • 2 篇 multicast routin...
  • 2 篇 unsupervised fea...
  • 2 篇 genetic algorith...
  • 2 篇 optimal placemen...
  • 2 篇 cancer classific...
  • 1 篇 semg

机构

  • 2 篇 psg coll technol...
  • 2 篇 natl univ comp &...
  • 2 篇 univ versailles ...
  • 2 篇 delhi technol un...
  • 1 篇 al imam muhammad...
  • 1 篇 nanjing inst tec...
  • 1 篇 yunnan normal un...
  • 1 篇 delhi technol un...
  • 1 篇 department of co...
  • 1 篇 natl inst techno...
  • 1 篇 natl yunlin univ...
  • 1 篇 pimpri chinchwad...
  • 1 篇 nit hamirpur dep...
  • 1 篇 kiit deemed univ...
  • 1 篇 jadavpur univ de...
  • 1 篇 mcmaster univ de...
  • 1 篇 nanjing univ sta...
  • 1 篇 constantine univ...
  • 1 篇 faculty of elect...
  • 1 篇 indian inst tech...

作者

  • 2 篇 sharma prerna
  • 2 篇 abdallah emtetha...
  • 2 篇 sharma kapil
  • 2 篇 enache adriana-c...
  • 2 篇 meraihi yassine
  • 2 篇 sgarciu valentin
  • 2 篇 gupta deepak
  • 2 篇 youssef karim h.
  • 2 篇 zafar kashif
  • 2 篇 tufail hina
  • 2 篇 acheli dalila
  • 1 篇 r.ramesh kumar
  • 1 篇 deshpande aishwa...
  • 1 篇 ahlawat anil k.
  • 1 篇 lin chenhao
  • 1 篇 ahmadian ali
  • 1 篇 chenikher salah
  • 1 篇 wu xiaobin
  • 1 篇 priyadarshini su...
  • 1 篇 deng congying

语言

  • 37 篇 英文
检索条件"主题词=Binary Bat Algorithm"
37 条 记 录,以下是31-40 订阅
排序:
A New Approach to Determine the Optimal Number and Arrangement of Power Quality Monitors for Voltage Sag Detection
A New Approach to Determine the Optimal Number and Arrangeme...
收藏 引用
IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI)
作者: Raif Aličić Senad Smaka Electricity Distribution Company ED Sarajevo Public Enterprise Electric Utility of Bosnia and Herzegovina Sarajevo Bosnia and Herzegovina Faculty of Electrical Engineering University of Sarajevo Sarajevo Bosnia and Herzegovina
This paper presents a new approach to determine the optimal number and arrangement of power quality monitors (PQMs) for voltage sag detection. It is necessary to determine the optimal number and arrangement of PQMs si... 详细信息
来源: 评论
Usability feature selection via MBbat: A novel approach
收藏 引用
JOURNAL OF COMPUTATIONAL SCIENCE 2017年 23卷 195-203页
作者: Gupta, Deepak Ahlawat, Anil K. MAIT Delhi India KIET Comp Sci & Engn Dept Ghaziabad India
In this paper, a metaheuristic algorithm has been introduced for software usability feature selection and evaluation. Usability is becoming one of the most significant aspects of quality of software. The term 'usa... 详细信息
来源: 评论
A Metaheuristic bat Inspired Technique for Cellular Network Optimization  2
A Metaheuristic Bat Inspired Technique for Cellular Network ...
收藏 引用
2nd International Conference on Man and Machine Interfacing (MAMI)
作者: Parija, Smita Sahu, P. K. Natl Inst Technol Dept Elect Engn Rourkela India
Proper location management of the mobile users in the mobile cellular networks is of great importance in this era of wireless communications. This paper has solved the location management issue based on the reporting ... 详细信息
来源: 评论
Expert System for Retrieval of Documents using Evolutionary Approaches incorporating Clustering
Expert System for Retrieval of Documents using Evolutionary ...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Deshpande, Sharvari Doke, Monika Deshpande, Aishwarya Chaudhari, Anagha N. Pimpri Chinchwad Coll Engn Dept Informat Technol Pune Maharashtra India
1Classification is a central problem in the fields of data mining and machine learning. Using a training set of labeled instances, the task is to build a model (classifier) that can be used to predict the class of new... 详细信息
来源: 评论
A binary bat Approach for Identification of Fatigue Condition from sEMG Signals  5th
A Binary Bat Approach for Identification of Fatigue Conditio...
收藏 引用
5th International Conference on Swarm, Evolutionary, and Memetic Computing (SEMCCO)
作者: Makaram, Navaneethakrishna Swaminathan, Ramakrishnan Indian Inst Technol Dept Appl Mech Non Invas Imaging & Diagnost Lab Madras 600036 Tamil Nadu India
In this work, an attempt has been made to investigate the effectiveness of binary bat algorithm as a feature selection method to classify sEMG signals under fatigue and nonfatigue conditions. The sEMG signals are reco... 详细信息
来源: 评论
An Immune Intelligent Approach for Security Assurance
An Immune Intelligent Approach for Security Assurance
收藏 引用
International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
作者: Enache, Adriana-Cristina Ionita, Mihai Sgarciu, Valentin Univ Politehn Fac Automat Control & Comp Sci Bucharest Romania Mil Tech Acad Fac Comp Sci Bucharest Romania
Information Security Assurance implies ensuring the integrity, confidentiality and availability of critical assets for an organization. The large amount of events to monitor in a fluid system in terms of topology and ... 详细信息
来源: 评论
Enhanced Intrusion Detection System Based on bat algorithm-support Vector Machine  11
Enhanced Intrusion Detection System Based on Bat Algorithm-s...
收藏 引用
11th International Conference on Security and Cryptography (SECRYPT)
作者: Enache, Adriana-Cristina Sgarciu, Valentin Univ Politehn Bucuresti Fac Automat Control & Comp Sci Bucharest Romania
As new security intrusions arise so does the demand for viable intrusion detection systems. These solutions must deal with huge data volumes, high speed network traffics and countervail new and various types of securi... 详细信息
来源: 评论