WebThe binary dragonfly algorithm has been enhanced by introducing two modifications. First, the authors use the Gaussian distribution random selection method for choosing the right value of the inertia weight w used to update the step vector (∆X). Second, the authors adopt chaotic maps to determine the random parameters s, a, c, f, and e. WebDec 16, 2024 · 3.1. The Binary Dragonfly Algorithm (BDA) A binary optimization issue is taken into account by a feature selection optimization. The solution space is shaped as a hypercube, where an individual area is distinguished inside the pursuit space utilizing the position vector x = {x 1, x 2,…, x d}.DA is initially proposed to deal with continuous …
Optimal Placement of Measuring Devices for Distribution ... - Hindawi
WebDragonfly algorithm is a recent swarm intelligence algorithm that mimics the behavior of the dragonflies. Eighteen UCI datasets are used to evaluate the performance of the … WebJan 9, 2024 · Binary Dragonfly Algorithm for Feature Selection Introduction This toolbox offers Binary Dragonfly Algorithm ( BDA ) method The Main file illustrates the example of how BDA can solve the feature selection problem using benchmark data-set. Input feat : feature vector ( Instances x Features ) label : label vector ( Instances x 1 ) circle of trust dames
Gokul Srinivasan - Worcester Polytechnic Institute - LinkedIn
WebJan 31, 2024 · Dragonfly algorithm (DA) is a novel swarm intelligence proposed by Mirjalili in 2015 for solving discrete problems, single-objective problems, and multi-objective problems [ 86 ]. Swarm intelligence is driven by animal populations and social bugs. We would like to show you a description here but the site won’t allow us. WebOct 13, 2024 · In this paper, a wrapper-feature selection algorithm based on the binary dragonfly algorithm is proposed. Dragonfly algorithm is a recent swarm intelligence … Webselection algorithm based on the binary dragonfly algorithm is proposed. Dragonfly algorithm is a recent swarm intelligence algorithm that mimics the behavior of the dragonflies. Eighteen UCI datasets are used to evaluate the performance of the proposed approach. The results of the proposed method are compared with circle of trust dewi jacket