Search Results - learning _ difference ((encryption algorithm) OR (evolutionary algorithm))
Search alternatives:
- difference »
- evolutionary »
-
1
Towards Software Product Lines Optimization Using Evolutionary Algorithms
Published 2019Get full text
Get full text
Proceeding Paper -
2
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. …”
Get full text
Get full text
Article -
3
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. …”
Get full text
Get full text
Article -
4
The Evolutionary Convergent Algorithm: A Guiding Path of Neural Network Advancement
Published 2025“…In this study, a new idea centered on seed growth, Seed Growth Algorithm (SGA), as a conditional convergent evolutionary algorithm is proposed for optimizing several discrete and continuous optimization problems. …”
Article -
5
-
6
Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects
Published 2014“…In addition, one of the proposed EANNs incorporates a facility to learn overlapping samples of different classes from the imbalanced data environment. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…In this project, research and literature reviews were conducted to explore the current technologies in smart aquaculture, federated learning, and data privacy. Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000Get full text
Get full text
Article -
11
-
12
Neural Controller Utilizing Genetic Algorithm Technique For Dynamic Systems
Published 2009“…This research presents a method of learning multilayer Neural Network (NN) using Genetic Algorithms (GAs) techniques. …”
Get full text
Get full text
Thesis -
13
Implementation of evolutionary computing models for reference evapotranspiration modeling: Short review, assessment and possible future research directions
Published 2019“…Among several machine learning models, evolutionary computing (EC) has demonstrated a remarkable progression in the modeling of ETo. …”
Get full text
Get full text
Get full text
Article -
14
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
15
-
16
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
17
Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots
Published 2006“…This research explores a new approach of using a multi-objective evolutionary algorithm (MOEA) to evolve robot controllers in performing phototaxis tasks while avoiding obstacles in a simulated 30 physics environment, to overcome problems involving more than one objective, where these objectives usually trade-off among each other and are expressed in different units. …”
Get full text
Get full text
Research Report -
18
On protecting data storage in mobile cloud computing paradigm
Published 2014“…However, these passwords and algorithms eventually get cracked by the expert hackers who mostly spend their entire time learning the algorithms and the way to get through the password-protected frameworks. …”
Get full text
Get full text
Get full text
Article -
19
Operating a reservoir system based on the shark machine learning algorithm
Published 2018“…The performance of the SMLA was compared with the performance of the most widespread evolutionary algorithms, namely, the genetic algorithm (GA). …”
Get full text
Get full text
Article -
20
