Search Results - learning based difference ((encryption algorithm) OR (evolutionary algorithm))
Search alternatives:
-
1
Towards Software Product Lines Optimization Using Evolutionary Algorithms
Published 2019Get full text
Get full text
Proceeding Paper -
2
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…As a family of evolutionary based algorithm, the effectiveness of Genetic Programming in providing the best machine learning pipelines for a given problem or dataset is substantially depending on the algorithm parameterizations including the mutation and crossover rates. …”
Get full text
Get full text
Article -
3
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…As a family of evolutionary based algorithm, the effectiveness of Genetic Programming in providing the best machine learning pipelines for a given problem or dataset is substantially depending on the algorithm parameterizations including the mutation and crossover rates. …”
Get full text
Get full text
Article -
4
-
5
-
6
-
7
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…In this project, research and literature reviews were conducted to explore the current technologies in smart aquaculture, federated learning, and data privacy. Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Neural Controller Utilizing Genetic Algorithm Technique For Dynamic Systems
Published 2009“…The evolutionary techniques based on GAs are studied and employed for the Model Reference Adaptive Control (MRAC) scheme of different plants.…”
Get full text
Get full text
Thesis -
9
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…To overcome the aforementioned issues, in this research proposed anomaly based detection is designed with Evolutionary Neural Network (ENN) by three different detection methods. …”
Get full text
Get full text
Thesis -
10
Implementation of evolutionary computing models for reference evapotranspiration modeling: Short review, assessment and possible future research directions
Published 2019“…Among several machine learning models, evolutionary computing (EC) has demonstrated a remarkable progression in the modeling of ETo. …”
Get full text
Get full text
Get full text
Article -
11
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
12
-
13
Operating a reservoir system based on the shark machine learning algorithm
Published 2018Get full text
Get full text
Article -
14
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
Get full text
Get full text
Get full text
Thesis -
15
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Get full text
Article -
16
-
17
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…Incorporating said strategy, the BSCCH algorithm has been proposed which is generic in nature and can be coupled with various evolutionary algorithms. …”
Get full text
Get full text
Article -
19
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
20
Hybrid harmony search algorithm for continuous optimization problems
Published 2020“…Meanwhile, to enhance its exploitation, this thesis also proposes to adopt a new variant of the opposition-based learning technique (OBL). Taken together, the proposed hybrid algorithm, called IHS-GWO, aims to address continuous optimization problems. …”
Get full text
Get full text
Thesis
