Search Results - (( evolution solution learning algorithm ) OR ( program segmentation using algorithm ))
Search alternatives:
- program segmentation »
- learning algorithm »
- solution learning »
- using algorithm »
-
1
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
Get full text
Get full text
Get full text
Article -
2
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
3
Differential evolution for neural networks learning enhancement
Published 2008“…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
Get full text
Get full text
Get full text
Thesis -
4
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
Get full text
Get full text
Article -
5
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Unlike existing OBL-based techniques, the PMT generates more than one candidate in multiple solution-space directions. To evaluate the PMT’s performance and adaptability, the PMT was applied to four contemporary metaheuristic algorithms, Differential Evolution, Particle Swarm Optimization, Simulated Annealing, and Whale Optimization Algorithm, to solve 15 well-known benchmark functions as well as 2 real world problems based on the welded beam design and pressure vessel design. …”
Get full text
Get full text
Thesis -
6
Dual optimization approach in discrete Hopfield neural network
Published 2024“…To evaluate the effectiveness of the Hybrid Differential Evolution Algorithm and Swarm Mutation in the learning and retrieval phases, several performance metrics are employed in terms of synaptic weight management, learning errors, testing errors, energy profiles, solution variations, and similarity for 10 different cases. …”
Get full text
Get full text
Article -
7
Nature-Inspired cognitive evolution to play Ms. Pac-Man
Published 2011“…On the other hand, an evolutionary algorithm is to simulate the biological evolutionary processes that evolve potential solutions in order to solve the problems or tasks by applying the genetic operators such as crossover, mutation and selection into the solutions. …”
Get full text
Get full text
Get full text
Article -
8
PMT: opposition-based learning technique for enhancing meta-heuristic performance
Published 2019“…Unlike existing OBL-based techniques, the PMT generates more than one candidate in multiple solution-space directions. To evaluate the PMT's performance and adaptability, the PMT has been applied to four contemporary meta-heuristic algorithms, differential evolution (DE), particle swarm optimization (PSO), simulated annealing (SA), and whale optimization algorithm (WOA), to solve 15 well-known benchmark functions. …”
Get full text
Get full text
Get full text
Article -
9
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
10
Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset
Published 2017“…In post-processing, the contour of liver is smooth by binary Gaussian filter. The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
Get full text
Get full text
Monograph -
11
Crossover and mutation operators of genetic algorithms
Published 2017Get full text
Get full text
Get full text
Article -
12
Crossover and mutation operators of genetic algorithms
Published 2017Get full text
Get full text
Get full text
Article -
13
-
14
Improved whale optimization algorithm for feature selection in Arabic sentiment analysis
Published 2019“…To verify our proposed approach, four Arabic benchmark datasets for sentiment analysis are used since there are only a few studies in sentiment analysis conducted for Arabic language as compared to English. The proposed algorithm is compared with six well-known optimization algorithms and two deep learning algorithms. …”
Get full text
Get full text
Article -
15
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution
Published 2018“…This approach improves the flexibility of the ESNN algorithm in producing better solutions which is utilized to conquer the K-means disadvantages. …”
Get full text
Get full text
Get full text
Book Chapter -
16
-
17
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…The project used Back-propagation Neural Network for the algorithm to classified images. …”
Get full text
Get full text
Thesis -
18
Word segmentation of output response for sign language devices
Published 2020“…The proposed text segmentation method in this work is by using the dynamic programming and back-off algorithm, together with the probability score using word matching with an English language text corpus. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis
