The bitterling fsh is a prime example of intelligent behavior in nature for survival. The bitterling fsh uses the oyster spawning strategy as their babysitter. The female bitterling fsh looks for a male fsh stronger than other fsh to fnd the right pair. In order to solve optimization issues, the Bitterling Fish Optimization (BFO) algorithm is modeled in this manuscript based on the mating behavior of these fsh. The bitterling fsh optimization algorithm is more accurate than the gray wolf optimization algorithm, whale optimization algorithm, butterfy optimization algorithm, Harris Hawks optimization algorithm, and black widow optimization algorithm, according to experiments and implementations on various benchmark functions. Data mining and machine learning are two areas where meta-heuristic techniques are frequently used. In trials, the MLP artifcial neural network and a binary version of the BFO algorithm are used to lower the detection error for intrusion trafc. The proposed method’s accuracy, precision, and sensitivity index for detecting network intrusion are 99.14%, 98.87%, and 98.85%, respectively, according to experiments on the NSL KDD data set. Compared to machine learning approaches like NNIA, DT, RF, XGBoot, and CNN, the proposed method is more accurate at detecting intrusion. The BFO algorithm is used for feature selection in the UNSW-NB15 dataset, and the tests showed that the accuracy of the proposed method is 96.72% in this dataset. The proposed method of the BFO algorithm is also used to improve Kmeans clustering, and the tests performed on the dataset of covid 19, diabetes, and kidney disease show that the proposed method performs better than iECA*, ECA*, GENCLUST+ +(G ++) methods. Deep has KNN, LVQ, SVM, ANN, and KNN.
Eser Adı (dc.title) | Bitterling fish optimization (BFO) algorithm |
Yazar (dc.contributor.author) | Cevat Rahebi |
Yayın Yılı (dc.date.issued) | 2024 |
Tür (dc.type) | Makale |
Özet (dc.description.abstract) | The bitterling fsh is a prime example of intelligent behavior in nature for survival. The bitterling fsh uses the oyster spawning strategy as their babysitter. The female bitterling fsh looks for a male fsh stronger than other fsh to fnd the right pair. In order to solve optimization issues, the Bitterling Fish Optimization (BFO) algorithm is modeled in this manuscript based on the mating behavior of these fsh. The bitterling fsh optimization algorithm is more accurate than the gray wolf optimization algorithm, whale optimization algorithm, butterfy optimization algorithm, Harris Hawks optimization algorithm, and black widow optimization algorithm, according to experiments and implementations on various benchmark functions. Data mining and machine learning are two areas where meta-heuristic techniques are frequently used. In trials, the MLP artifcial neural network and a binary version of the BFO algorithm are used to lower the detection error for intrusion trafc. The proposed method’s accuracy, precision, and sensitivity index for detecting network intrusion are 99.14%, 98.87%, and 98.85%, respectively, according to experiments on the NSL KDD data set. Compared to machine learning approaches like NNIA, DT, RF, XGBoot, and CNN, the proposed method is more accurate at detecting intrusion. The BFO algorithm is used for feature selection in the UNSW-NB15 dataset, and the tests showed that the accuracy of the proposed method is 96.72% in this dataset. The proposed method of the BFO algorithm is also used to improve Kmeans clustering, and the tests performed on the dataset of covid 19, diabetes, and kidney disease show that the proposed method performs better than iECA*, ECA*, GENCLUST+ +(G ++) methods. Deep has KNN, LVQ, SVM, ANN, and KNN. |
Açık Erişim Tarihi (dc.date.available) | 2024-02-03 |
Yayıncı (dc.publisher) | Multimedia Tools and Applications |
Dil (dc.language.iso) | En |
Konu Başlıkları (dc.subject) | Optimization problems |
Konu Başlıkları (dc.subject) | Meta-heuristic algorithm |
Konu Başlıkları (dc.subject) | Bitterling Fish optimization(BFO) algorithm |
Konu Başlıkları (dc.subject) | Data mining |
Tek Biçim Adres (dc.identifier.uri) | https://hdl.handle.net/20.500.14081/1927 |
ISSN (dc.identifier.issn) | 13807501 |
Dergi (dc.relation.journal) | Multimedia Tools and Applications |
Esere Katkı Sağlayan (dc.contributor.other) | Rahebi, Javad |
Esere Katkı Sağlayan (dc.contributor.other) | Zareian, Lida |
Esere Katkı Sağlayan (dc.contributor.other) | Shayegan, Mohammad Javad |
DOI (dc.identifier.doi) | 10.1007/s11042-024-18579-0 |
Orcid (dc.identifier.orcid) | 0000-0001-9875-4860 |
wosquality (dc.identifier.wosquality) | Q2 |
wosauthorid (dc.contributor.wosauthorid) | DNF-7937-2022 |
Department (dc.contributor.department) | Yazılım Mühendisliği |
Wos No (dc.identifier.wos) | WOS:001167950900002 |
Veritabanları (dc.source.platform) | Wos |
Veritabanları (dc.source.platform) | Scopus |