Results 41 to 50 of about 87,787 (275)

Significance Relations for the Benchmarking of Meta-Heuristic Algorithms

open access: yes, 2013
The experimental analysis of meta-heuristic algorithm performance is usually based on comparing average performance metric values over a set of algorithm instances.
Koeppen, Mario, Ohnishi, Kei
core   +1 more source

A Search-Based Test Data Generation Method for Concurrent Programs

open access: yesInternational Journal of Computational Intelligence Systems, 2020
Concurrent programs are being widely adopted in development of multi-core and many-core processors. However, these types of programs present some features such as concurrency, communication and synchronization which make their testing more challenging ...
Seyed Mohsen Mirhosseini   +1 more
doaj   +1 more source

Training a Feed-forward Neural Network with Artificial Bee Colony Based Backpropagation Method

open access: yes, 2012
Back-propagation algorithm is one of the most widely used and popular techniques to optimize the feed forward neural network training. Nature inspired meta-heuristic algorithms also provide derivative-free solution to optimize complex problem. Artificial
Das, Achintya   +2 more
core   +1 more source

A Meta-Heuristic Load Balancer for Cloud Computing Systems [PDF]

open access: yes, 2015
This paper introduces a strategy to allocate services on a cloud system without overloading the nodes and maintaining the system stability with minimum cost.
Getov, Vladimir   +3 more
core   +2 more sources

Application of predator-prey optimization for task scheduling in cloud computing [PDF]

open access: yesJournal of Mahani Mathematical Research
Cloud computing environments require scheduling to allocate resources efficiently and ensure optimal performance. It is possible to maximize resource utilization and minimize execution time by scheduling cloud systems effectively.
Zahra Jalali Khalil Abadi   +3 more
doaj   +1 more source

Towards Autonomous Production: Enhanced Meta-heuristics Algorithm

open access: yesProcedia Computer Science, 2022
Industry 4.0's vision incorporates decentralised production planning and control to cater for the complex and unpredictable future production environment, resulting from market fluctuation, and changes in customers demands and behaviour. One of the primary goals of decentralised planning and control in industry 4.0 is to realise a fully autonomous ...
Ogunsakin, Rotimi, Mehandjiev, Nikolay
openaire   +2 more sources

Innovating Aircraft Repair Processes: The Role of Digitalization in Sustainability

open access: yesAdvanced Engineering Materials, EarlyView.
This research explores how digitalization—by storing detailed non‐destructive testing data in structured DICONDE databases and creating a standard data model of the component—innovates aviation maintenance and repair processes. Coupled with a developed state‐based simulation model, it enables data‐driven, sustainable repair strategies that reduce waste,
Johanna Aigner   +3 more
wiley   +1 more source

ACO for continuous function optimization: a performance analysis [PDF]

open access: yes, 2014
The performance of the meta-heuristic algorithms often depends on their parameter settings. Appropriate tuning of the underlying parameters can drastically improve the performance of a meta-heuristic. The Ant Colony Optimization (ACO), a population based
Abraham, Ajith   +2 more
core  

In Situ Characterisation of Hydrogels via Dynamic Interface Printing

open access: yesAdvanced Science, EarlyView.
ABSTRACT Hydrogels have become pivotal materials for tissue engineering, robotics, biomedical devices, and sensing applications due to their diverse material compositions and tunable mechanical properties. While significant effort has focused on developing novel manufacturing approaches such as extrusion bioprinting and light‐based fabrication methods,
Callum Vidler   +2 more
wiley   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy