Zobrazeno 1 - 10
of 207
pro vyhledávání: '"Black hole algorithm"'
Autor:
Nur 'Afifah Rusdi, Nur Ezlin Zamri, Mohd Shareduwan Mohd Kasihmuddin, Nurul Atiqah Romli, Gaeithry Manoharam, Suad Abdeen, Mohd. Asyraf Mansor
Publikováno v:
AIMS Mathematics, Vol 9, Iss 11, Pp 29820-29882 (2024)
The current systematic logical rules in the Discrete Hopfield Neural Network encounter significant challenges, including repetitive final neuron states that lead to the issue of overfitting. Furthermore, the systematic logical rules neglect the impac
Externí odkaz:
https://doaj.org/article/bd75417beea34205b685206cf7e10072
Publikováno v:
Complex & Intelligent Systems, Vol 10, Iss 4, Pp 5083-5106 (2024)
Abstract Data clustering has attracted the interest of scholars in many fields. In recent years, using heuristic algorithms to solve data clustering problems has gradually become a tendency. The black hole algorithm (BHA) is one of the popular heuris
Externí odkaz:
https://doaj.org/article/91fd507f5e0e4bb9a5dfba347c342dee
Publikováno v:
Applied Sciences, Vol 14, Iss 12, p 5207 (2024)
High-dimensional datasets often harbor redundant, irrelevant, and noisy features that detrimentally impact classification algorithm performance. Feature selection (FS) aims to mitigate this issue by identifying and retaining only the most pertinent f
Externí odkaz:
https://doaj.org/article/6fc30ce2f9f94caa8766ff04c8fe0533
Autor:
Xin Yong, Yuelin Gao
Publikováno v:
IEEE Access, Vol 11, Pp 28551-28564 (2023)
Computer networks have touched every aspect of human life, it cannot be overstated that cyber security is of great importance and significance. Intrusion detection techniques play an important role in the field of network security, but it also faces
Externí odkaz:
https://doaj.org/article/ddae4aef65f840cebccdc69f9e81b07f
Autor:
Cheng Weng Fong, Pui Huang Leong, Hishammuddin Asmuni, Yee Yong Pang, Hiew Moi Sim, Radziah Mohamad, Jun Kit Chaw
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 6, Iss 2-2, Pp 572-580 (2022)
University timetabling construction is a complicated task that is encountered by universities in the world. In this study, a hybrid approach has been developed to produce timetable solution for the university examination timetabling problem. Black Ho
Externí odkaz:
https://doaj.org/article/dbf29d806e3046bd984141ab43d95f53
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 7, Pp 4075-4088 (2022)
K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. Although generalization-based k-anonymity approaches can achieve the privacy protection objective, they suffer from information loss
Externí odkaz:
https://doaj.org/article/8f72899de2da4ab9afcf543c8a9aba3c
Publikováno v:
IEEE Access, Vol 10, Pp 97310-97326 (2022)
In information retrieval and text mining, document clustering is a big challenge because the amount of document collection has been increasing, day by day. The problem of clustering is NP-hard, use of meta-heuristic algorithms to solve these problems
Externí odkaz:
https://doaj.org/article/79e12d37954c44948ffb919f5743c9dd
Autor:
Abdolreza Hatamlou
Publikováno v:
Computer and Knowledge Engineering, Vol 4, Iss 2, Pp 11-16 (2021)
This study investigates the application of the Black Hole algorithm (BH) for solving 0–1 knapsack problems. Knapsack problem is a classic and famous problem for testing and analyzing the behavior of optimization and meta-heuristic algorithms. There
Externí odkaz:
https://doaj.org/article/a0990ec2b9ac46b1856e08af7134b2a0
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Sensors, Vol 23, Iss 9, p 4520 (2023)
The mobile node location method can find unknown nodes in real time and capture the movement trajectory of unknown nodes in time, which has attracted more and more attention from researchers. Due to their advantages of simplicity and efficiency, inte
Externí odkaz:
https://doaj.org/article/5e356ebcfe9243819da8a66f1788d0f1