Globalized firefly algorithm and chaos for designing substitution box

HS Alhadawi, D Lambić, MF Zolkipli… - Journal of Information …, 2020 - Elsevier
This study adopted a metaheuristic approach based on the firefly algorithm (FA) optimization
to generate an appropriate configuration for an 8× 8 Substitution boxes (S-boxes). The FA …

Multi-swarm bat algorithm for association rule mining using multiple cooperative strategies

KE Heraguemi, N Kamel, H Drias - Applied Intelligence, 2016 - Springer
Abstract Association Rule Mining (ARM) can be considered as a combinatorial problem with
the purpose of extracting the correlations between items in sizeable datasets. The numerous …

A multi-swarm structure for particle swarm optimization: Solving the welded beam design problem

AT Kamil, HM Saleh, IH Abd-Alla - Journal of Physics …, 2021 - iopscience.iop.org
Several studies exist in the literature that utilized metaheuristics and nature-inspired
algorithms to solve engineering problems. Particle Swarm Optimization (PSO) is a well …

Bat Algorithm Based Hybrid Filter‐Wrapper Approach

AM Taha, SD Chen, A Mustapha - Advances in Operations …, 2015 - Wiley Online Library
This paper presents a new hybrid of Bat Algorithm (BA) based on Mutual Information (MI)
and Naive Bayes called BAMI. In BAMI, MI was used to identify promising features which …

[HTML][HTML] An agent-based algorithm resembles behaviour of tree-dwelling bats under fission–fusion dynamics

J Zelenka, T Kasanický, I Budinská, P Kaňuch - Scientific Reports, 2020 - nature.com
Utilization of computational approach in the study of social behaviour of animals is
increasing and we attempted such an approach in our study of tree-dwelling bats. These …

[PDF][PDF] Feature Selection Method based on Chaotic Salp Swarm Algorithm and Extreme Learning Machine for Network Intrusion Detection Systems

RN Hadi, RO Mahmoud, AST Eldien - Management, 2021 - mail.webology.org
Abstract Network Intrusion Detection Systems (IDSs) have been widely used to monitor and
manage network connections and prevent unauthorized connections. Machine learning …

[PDF][PDF] An Integrated Information Gain with A Black Hole Algorithm for Feature Selection: A Case Study of E-mail Spam Filtering

A Mahmood, AHM Al-Helali - Iraqi Journal of Science, 2023 - iasj.net
The current issues in spam email detection systems are directly related to spam email
classification's low accuracy and feature selection's high dimensionality. However, in …

Solving optimization problems using hybrid metaheuristics: Genetic algorithm and black hole algorithm

OS Mohammed, AAAM Sewisy… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
During the last two decades, many optimization algorithms have been developed for solving
optimization problems. These algorithms have inspired from an intelligent behaviour of a …

Levy flight salp swarm algorithm-based feature selection method for network intrusion detection systems

HM Saleh, SS Hameed… - AIP Conference …, 2022 - pubs.aip.org
One of the primary issues in this subject is the low accuracy of existing Network Intrusion
Detection Systems (IDS); this issue is exacerbated by the high dimensionality of the feature …

Solid waste collection optimization using scine-cosine algorithm

AH Ali, MM Shakir - Periodicals of Engineering and Natural …, 2020 - pen.ius.edu.ba
In this study, a mathematical model for optimizing the cost of solid waste recycling and
management was developed. Sine-Cosine Algorithm (SCA) was used during the …