Metaheuristics For Machine Learning Algorithms And Applications For True Epub Kanak Kalita instant download
Metaheuristics For Machine Learning Algorithms And Applications For True Epub Kanak Kalita instant download
https://ebookbell.com/product/metaheuristics-for-machine-
learning-algorithms-and-applications-for-true-epub-kanak-
kalita-56672990
https://ebookbell.com/product/metaheuristics-for-machine-learning-
algorithms-and-applications-1st-edition-kanak-kalita-56790898
https://ebookbell.com/product/machine-learning-with-metaheuristic-
algorithms-for-sustainable-water-resources-management-ozgur-
kisi-50680880
https://ebookbell.com/product/metaheuristics-for-machine-learning-new-
advances-and-tools-mansour-eddaly-48171748
https://ebookbell.com/product/integrating-metaheuristics-and-machine-
learning-for-realworld-optimization-problems-essam-halim-
houssein-46303758
Metaheuristic And Machine Learning Optimization Strategies For Complex
Systems Thanigaivelan R
https://ebookbell.com/product/metaheuristic-and-machine-learning-
optimization-strategies-for-complex-systems-thanigaivelan-r-59243788
https://ebookbell.com/product/metaheuristics-for-scheduling-in-
industrial-and-manufacturing-applications-1st-edition-g-i-
zobolas-2165666
https://ebookbell.com/product/metaheuristics-for-scheduling-in-
distributed-computing-environments-1st-edition-fatos-xhafa-2171740
https://ebookbell.com/product/metaheuristics-for-robotics-oulhadj-
hamouchedaachi-boubakermenasri-21995444
https://ebookbell.com/product/metaheuristics-for-hard-optimization-
methods-and-case-studies-1st-edition-johann-dro-2326422
Table of Contents
1. Cover
2. Table of Contents
3. Series Page
4. Title Page
5. Copyright Page
6. Foreword
7. Preface
8. 1 Metaheuristic Algorithms and Their Applications in
Different Fields: A Comprehensive Review
1. 1.1 Introduction
2. 1.2 Types of Metaheuristic Algorithms
3. 1.3 Application of Metaheuristic Algorithms
4. 1.4 Future Direction
5. 1.5 Conclusion
6. References
9. 2 A Comprehensive Review of Metaheuristics for
Hyperparameter Optimization in Machine Learning
1. 2.1 Introduction
2. 2.2 Fundamentals of Hyperparameter Optimization
3. 2.3 Overview of Metaheuristic Optimization Techniques
4. 2.4 Population-Based Metaheuristic Techniques
5. 2.5 Single Solution-Based Metaheuristic Techniques
6. 2.6 Hybrid Metaheuristic Techniques
7. 2.7 Metaheuristics in Bayesian Optimization
8. 2.8 Metaheuristics in Neural Architecture Search
9. 2.9 Comparison of Metaheuristic Techniques for
Hyperparameter Optimization
10. 2.10 Applications of Metaheuristics in Machine Learning
11. 2.11 Future Directions and Open Challenges
12. 2.12 Conclusion
13. References
10. 3 A Survey of Computer-Aided Diagnosis Systems for Breast
Cancer Detection
1. 3.1 Introduction
2. 3.2 Procedure for Research Survey
3. 3.3 Imaging Modalities and Their Datasets
4. 3.4 Research Survey
5. 3.5 Conclusion
6. 3.6 Acknowledgment
7. References
11. 4 Enhancing Feature Selection Through Metaheuristic Hybrid
Cuckoo Search and Harris Hawks Optimization for Cancer
Classification
1. 4.1 Introduction
2. 4.2 Related Work
3. 4.3 Proposed Methodology
4. 4.4 Experimental Setup
5. 4.5 Results and Discussion
6. 4.6 Conclusion
7. References
12. 5 Anomaly Identification in Surveillance Video Using
Regressive Bidirectional LSTM with Hyperparameter
Optimization
1. 5.1 Introduction
2. 5.2 Literature Survey
3. 5.3 Proposed Methodology
4. 5.4 Result and Discussion
5. 5.5 Conclusion
6. References
13. 6 Ensemble Machine Learning-Based Botnet Attack Detection
for IoT Applications
1. 6.1 Introduction
2. 6.2 Literature Survey
3. 6.3 Proposed System
4. 6.4 Results and Discussion
5. 6.5 Conclusion
6. References
14. 7 Machine Learning-Based Intrusion Detection System with
Tuned Spider Monkey Optimization for Wireless Sensor
Networks
1. 7.1 Introduction
2. 7.2 Literature Review
3. 7.3 Proposed Methodology
4. 7.4 Result and Discussion
5. 7.5 Conclusion
6. References
15. 8 Security Enhancement in IoMT‑Assisted Smart Healthcare
System Using the Machine Learning Approach
1. 8.1 Introduction
2. 8.2 Literature Review
3. 8.3 Proposed Methodology
4. 8.4 Conclusion
5. References
16. 9 Building Sustainable Communication: A Game-Theoretic
Approach in 5G and 6G Cellular Networks
1. 9.1 Introduction
2. 9.2 Related Works
3. 9.3 Methodology
4. 9.4 Result
5. 9.5 Conclusion
6. References
17. 10 Autonomous Vehicle Optimization: Striking a Balance
Between Cost-Effectiveness and Sustainability
1. 10.1 Introduction
2. 10.2 Methods
3. 10.3 Results
4. 10.4 Conclusions
5. References
18. 11 Adapting Underground Parking for the Future:
Sustainability and Shared Autonomous Vehicles
1. 11.1 Introduction
2. 11.2 Related Works
3. 11.3 Methodology
4. 11.4 Analysis
5. 11.5 Conclusion
6. References
19. 12 Big Data Analytics for a Sustainable Competitive Edge: An
Impact Assessment
1. 12.1 Introduction
2. 12.2 Related Works
3. 12.3 Hypothesis and Research Model
4. 12.4 Results
5. 12.5 Conclusion
6. References
20. 13 Sustainability and Technological Innovation in
Organizations: The Mediating Role of Green Practices
1. 13.1 Introduction
2. 13.2 Related Work
3. 13.3 Methodology
4. 13.4 Discussion
5. 13.5 Conclusions
6. References
21. 14 Optimal Cell Planning in Two Tier Heterogeneous
Network through Meta-Heuristic Algorithms
1. 14.1 Introduction
2. 14.2 System Model and Formulation of the Problem
3. 14.3 Result and Discussion
4. 14.4 Conclusion
5. References
22. 15 Soil Aggregate Stability Prediction Using a Hybrid Machine
Learning Algorithm
1. 15.1 Introduction
2. 15.2 Related Works
3. 15.3 Proposed Methodology
4. 15.4 Result and Discussion
5. 15.5 Conclusion
6. References
23. Index
24. Also of Interest
25. End User License Agreement
List of Tables
1. Chapter 1
1. Table 1.1 Strengths and weaknesses of metaheuristic
algorithms.
2. Chapter 2
1. Table 2.1 Breakdown of popular metaheuristics and their
I&D components [75]....
2. Table 2.2 Performance comparison of four different
metaheuristics based on a...
3. Table 2.3 Performance comparison of eight population-
based metaheuristics fo...
3. Chapter 3
1. Table 3.1 Summary of the medical jargon used.
2. Table 3.2 Advantages and disadvantages.
4. Chapter 4
1. Table 4.1 Information regarding the six cancer microarray
data.
2. Table 4.2 Parameter settings of the proposed algorithm.
3. Table 4.3 Accuracies of the proposed algorithm with the
mRMR, mRMR+CSA, and ...
4. Table 4.4 Accuracies of the proposed algorithm with the
mRMR, mRMR+CSA, and ...
5. Table 4.5 Accuracies of the proposed algorithm with the
mRMR, mRMR+CSA, and ...
6. Table 4.6 Comparison of the different published methods
with the proposed me...
5. Chapter 8
1. Table 8.1 Comparison of the accuracy.
2. Table 8.2 Comparison of the precision.
3. Table 8.3 Comparison of the sensitivity.
4. Table 8.4 Comparison of the specificity.
5. Table 8.5 Comparison of the security.
6. Chapter 10
1. Table 10.1 Example of demand and supply data from
expert interviews with the...
2. Table 10.2 Provides an analysis of the logistic network
situation.
7. Chapter 11
1. Table 11.1 Index of the driver, status, and response model
system.
2. Table 11.2 The DSR indexes’ weights and value
attributions.
3. Table 11.3 Rankings of function replacement for each UPS
type.
8. Chapter 12
1. Table 12.1 Results of validity and reliability tests.
2. Table 12.2 HTMT values.
3. Table 12.3 Examine the legitimacy of differences.
4. Table 12.4 The model’s fit outcomes.
9. Chapter 13
1. Table 13.1 Description of the companies.
2. Table 13.2 Presentation of illustrative information.
3. Table 13.3 Impact on the various aspects.
4. Table 13.4 Credibility, dependability, and relevance.
5. Table 13.5 Inferential statistics.
6. Table 13.6 Evaluation of interactions.
10. Chapter 14
1. Table 14.1 Parameter values.
List of Illustrations
1. Chapter 1
1. Figure 1.1 Flowchart of the genetic algorithm.
2. Figure 1.2 Flowchart of simulated annealing.
3. Figure 1.3 Flowchart of the particle swarm optimization.
4. Figure 1.4 Flowchart of the ant colony optimization.
2. Chapter 2
1. Figure 2.1 Tabu search for optimizing the tour cost for a
city plotted vs. ite...
2. Figure 2.2 A Gaussian process approximation of an
objective function being ite...
3. Figure 2.3 Convergence comparison of four metaheuristics
based on the first 10...
4. Figure 2.4 Best score convergence profiles vs. iterations for
eight renowned a...
5. Figure 2.5 Accuracy of metaheuristics for different ML
models [83].
3. Chapter 3
1. Figure 3.1 Pictorial representation of the imaging
modalities.
2. Figure 3.2 CNN architecture as illustrated by Mohamed et
al. in [29].
4. Chapter 4
1. Figure 4.1 The proposed research methodology.
2. Figure 4.2 Hybrid flowchart of the HHO and CSA.
3. Figure 4.3 Error comparison with the SVM classifier.
4. Figure 4.4 The variance observed in the proposed
algorithm (mRMR+CSAHHO) compa...
5. Figure 4.5 Error comparison with the KNN classifier.
6. Figure 4.6 The variance observed in the proposed
algorithm (mRMR+CSAHHO) compa...
7. Figure 4.7 Error comparison with the NB classifier.
8. Figure 4.8 The variance observed in the proposed
algorithm (mRMR+CSAHHO) compa...
5. Chapter 5
1. Figure 5.1 Schematic architecture of our proposed system.
2. Figure 5.2 Normal and abnormal clips from the
ShanghaiTech dataset.
3. Figure 5.3 Accuracy comparison between the suggested
and current techniques.
4. Figure 5.4 Precision comparison between the suggested
and current techniques....
5. Figure 5.5 Recall comparison between the suggested and
current techniques.
6. Figure 5.6 Error rate comparison between the suggested
and current techniques....
6. Chapter 6
1. Figure 6.1 The proposed methodology.
2. Figure 6.2 The dataset’s distribution.
3. Figure 6.3 Architecture of the ANN.
4. Figure 6.4 Results of accuracy.
5. Figure 6.5 Results of precision.
6. Figure 6.6 Results of recall.
7. Figure 6.7 Results of the F-measure.
7. Chapter 7
1. Figure 7.1 Flowchart of the proposed SVM-TSMO model.
2. Figure 7.2 The support vector machine.
3. Figure 7.3 Accuracy of the existing and proposed methods.
4. Figure 7.4 Precision of the existing and proposed methods.
5. Figure 7.5 Recall % of the existing and proposed methods.
6. Figure 7.6 F1-measure of the existing and proposed
methods.
8. Chapter 8
1. Figure 8.1 The IoMT-smart healthcare system.
2. Figure 8.2 A systematic diagram of security enhancement
in the IoMT using mach...
3. Figure 8.3 Diagrammatic representation of the proposed
method.
4. Figure 8.4 The linear SVM model.
5. Figure 8.5 The MLPSO algorithm flowchart.
9. Chapter 9
1. Figure 9.1 IDO based on a game model.
2. Figure 9.2 Spectrum use ratio.
3. Figure 9.3 Offload ratio.
4. Figure 9.4 Throughput analysis.
5. Figure 9.5 Response delay analysis.
6. Figure 9.6 Energy consumption analysis.
10. Chapter 10
1. Figure 10.1 Framework for logistic clusters that limits
supply chain managemen...
2. Figure 10.2 Illustrates the assumptions of the logistic
network model.
3. Figure 10.3 Distribution model simulations with simulated
annealing.
11. Chapter 11
1. Figure 11.1 Weight matrix of attributes.
2. Figure 11.2 Ranking of the factors.
3. Figure 11.3 UPS-type characteristics.
4. Figure 11.4 Renewal time outcomes.
5. Figure 11.5 Analyzing renewal timing and UPS properties.
6. Figure 11.6 Distribution of renewal times.
12. Chapter 12
1. Figure 12.1 Suggested research design.
2. Figure 12.2 Reliability and validity of the CA.
3. Figure 12.3 Reliability and validity of the CR.
4. Figure 12.4 Reliability and validity of the AVE.
13. Chapter 13
1. Figure 13.1 Method of measuring model.
2. Figure 13.2 Model of structure.
14. Chapter 14
1. Figure 14.1 System model.
2. Figure 14.2 Flowchart of the proposed model.
3. Figure 14.3 Optimal user association to BSs with data suit-
1.
4. Figure 14.4 Optimal user association to BSs with data suit-
2.
5. Figure 14.5 Network utility maximization graph.
15. Chapter 15
1. Figure 15.1 Block diagram of soil aggregation.
2. Figure 15.2 C5.0’s algorithm flow.
3. Figure 15.3 Comparative analysis of the RMSE.
4. Figure 15.4 Comparative analysis of the R2.
5. Figure 15.5 Comparative analysis of the nRMSE.
6. Figure 15.6 Comparative analysis of the MAE.
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Publishers at Scrivener
Martin Scrivener ([email protected])
Phillip Carmical ([email protected])
Metaheuristics for Machine Learning
Edited by
Kanak Kalita
Vel Tech University, Avadi, India
Narayanan Ganesh
Vellore Institute of Technology, Chennai, India
and
S. Balamurugan
Intelligent Research Consultancy Services, Coimbatore,
Tamilnadu, India
This edition first published 2024 by John Wiley & Sons, Inc., 111 River Street,
Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite
541J, Beverly, MA 01915, USA
© 2024 Scrivener Publishing LLC
For more information about Scrivener publications please visit
www.scrivenerpublishing.com.
For details of our global editorial offices, customer services, and more information
about Wiley products visit us at www.wiley.com.
ISBN 978-1-394-23392-2
Kanak Kalita
Narayanan Ganesh
S. Balamurugan
1
Metaheuristic Algorithms and
Their Applications in Different
Fields: A Comprehensive Review
Abrar Yaqoob1*, Navneet Kumar Verma2 and Rabia Musheer
Aziz1
1
School of Advanced Science and Language, VIT Bhopal
University, Kothrikalan, Sehore, India
2
State Planning Institute (New Division), Planning Department
Lucknow, Utter Pradesh, India
Abstract
1.1 Introduction
Metaheuristics represent a category of optimization methods
widely employed to tackle intricate challenges in diverse
domains such as engineering, economics, computer science,
and operations research. These adaptable techniques are
designed to locate favorable solutions by exploring an extensive
array of possibilities and avoiding stagnation in suboptimal
outcomes [1]. The roots and advancement of metaheuristics can
be traced back to the early 1950s when George Dantzig
introduced the simplex approach for linear programming [2].
This innovative technique marked a pivotal point in
optimization and paved the way for the emergence of
subsequent optimization algorithms. Nonetheless, the simplex
method’s applicability is confined to linear programming issues
and does not extend to nonlinear problems. In the latter part of
the 1950s, John Holland devised the genetic algorithm, drawing
inspiration from concepts of natural selection and evolution [3].
The genetic algorithm assembles a set of potential solutions and
iteratively enhances this set through genetic operations like
mutation, crossover, and selection [4]. The genetic algorithm
was a major milestone in the development of metaheuristics
and opened up new possibilities for resolving difficult
optimization issues. During the 1980s and 1990s, the field of
metaheuristics experienced significant expansion and the
emergence of numerous novel algorithms. These techniques,
which include simulated annealing (SA), tabu search (TS), ant
colony optimization (ACO), particle swarm optimization (PSO),
and differential evolution (DE), were created expressly to deal
with a variety of optimization issues. They drew inspiration
from concepts like simulated annealing, tabu search, swarm
intelligence, and evolutionary algorithms [5].
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
ebookbell.com