Search alternatives:
algorithm link » algorithm using (Expand Search), algorithm its (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
algorithm link » algorithm using (Expand Search), algorithm its (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
-
1
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. RVFL model has several characteristics such as fast training speed, direct links, simple architecture, and universal approximation capability, that make it a viable randomized neural network. …”
-
2
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”
-
3
Online dynamic ensemble deep random vector functional link neural network for forecasting
Published 2023“…<p>This paper proposes a three-stage online deep learning model for time series based on the ensemble deep random vector functional link (edRVFL). The edRVFL stacks multiple randomized layers to enhance the single-layer RVFL’s representation ability. …”
-
4
-
5
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
6
Computational evluation of protein energy functions
Published 2014Get full text
Get full text
Get full text
conferenceObject -
7
Belief selection in point-based planning algorithms for POMDPs
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
A new genetic algorithm approach for unit commitment
Published 1997“…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
Get full text
Get full text
article -
9
Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation
Published 2024“…In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. We used 480 brain MRI images from the publicly availabel IXI database and segmented them into gray matter (GM), white matter (WM), and cerebrospinal fluid (CSF) images to show age-related associations by region. …”
-
10
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
Get full text
article -
11
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
Get full text
article -
12
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
Published 2012“…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
Get full text
Get full text
Get full text
article -
13
-
14
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …”
-
15
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Published 2024“…The current tree-based ME algorithms often overlook considerations for node/link failures or offer costly methods for failure recovery. …”
-
16
-
17
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
Published 2019“…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
Get full text
Get full text
Get full text
Get full text
article -
18
On the parameterized parallel complexity and the vertex cover problem
Published 2016Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
Optimization metaheuristic for software testing
Published 2013Get full text
Get full text
Get full text
Get full text
conferenceObject -
20
Anonymizing multimedia documents
Published 2016Get full text
Get full text
Get full text
Get full text
article