Search alternatives:
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
colony » colon (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
elementi » elements (Expand Search), element (Expand Search), elemental (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
colony » colon (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
elementi » elements (Expand Search), element (Expand Search), elemental (Expand Search)
-
1
A PARALLEL AND DISTRIBUTED FRAMEWORK FOR IMPLEMENTING BACK PROPAGATION ALGORITHM IN BIG DATA
Published 2020Get full text
Get full text
masterThesis -
2
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The search accomplished by three types of bees over a number of iterations aiming to find the source with the highest nectar value (fitness value of a candidate solution). We apply the Bee Colony algorithm to previously published data. Experimental results show good solutions that maximize the preferences of proctors while preserving the fairness of the workload given to proctors. …”
Get full text
Get full text
Get full text
article -
3
Bee colony algorithm for assigning proctors to exams. (c2013)
Published 2013Get full text
Get full text
masterThesis -
4
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…We use an ant colony optimization algorithm in the adaptation process. …”
Get full text
Get full text
Get full text
article -
5
-
6
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
7
A parallel ant colony optimization to globally optimize area in high-level synthesis. (c2011)
Published 2011Get full text
Get full text
masterThesis -
8
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
9
-
10
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …”
Get full text
Get full text
Get full text
masterThesis -
11
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
Get full text
Get full text
masterThesis -
12
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
13
Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles
Published 2024“…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …”
-
14
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
15
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We evaluate our algorithm on proteins taken from a Protein Data Bank. …”
Get full text
Get full text
Get full text
conferenceObject -
16
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The forecasting performance of the proposed model is compared with other population-based optimized IT2-FLS including genetic algorithm and artificial bee colony optimization algorithm. …”
-
17
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
Published 2019Get full text
doctoralThesis -
18
Information reconciliation through agent controlled graph model. (c2018)
Published 2018“…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …”
Get full text
Get full text
Get full text
masterThesis -
19
Information Warfare
Published 2015Get full text
Get full text
Get full text
Get full text
conferenceObject -
20
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
Published 2017“…Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …”
Get full text
Get full text
Get full text
Get full text
article