矿石 发表于 2025-3-25 04:47:31
Horst-Georg Schmalfuß,W. Dettmering paper presents a discussion about the role of uncertainty within classification tasks and goes on to identify the strengths and weaknesses of the dendritic cell algorithm from this perspective. By examining other techniques for protecting against uncertainty, future directions for the dendritic cell algorithm are identified and discussed.密码 发表于 2025-3-25 09:55:47
http://reply.papertrans.cn/17/1621/162058/162058_22.pngglamor 发表于 2025-3-25 11:53:22
http://reply.papertrans.cn/17/1621/162058/162058_23.png天气 发表于 2025-3-25 16:37:28
Verfahren zur Mittelwertbildung,rformance when solving optimization problems involving computationally expensive objective functions. Computational experiments to assess the performance of the proposed procedure using 23 test-problems from the literature are presented.NAUT 发表于 2025-3-25 20:23:58
http://reply.papertrans.cn/17/1621/162058/162058_25.pngInfirm 发表于 2025-3-26 01:18:29
Verfahren zur Mittelwertbildung,mpared with previous work using the CLONALG approach. Experimental results shows that although not as efficient as CLONALG, the opt-AiNet based approach still shows promising results for learning qualitative models. In addition, possible future work to further improve the efficiency of QML-AiNet is also pointed out.Formidable 发表于 2025-3-26 06:41:34
http://reply.papertrans.cn/17/1621/162058/162058_27.pngatopic 发表于 2025-3-26 11:19:37
A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systeriented tasks. Each .P in the array is capable of processing one of these tasks. The algorithm assigns tasks to the .P array that satisfies the requirements of the problem, and it dynamically recovers the system from faults at runtime.庇护 发表于 2025-3-26 15:35:38
http://reply.papertrans.cn/17/1621/162058/162058_29.pngParley 发表于 2025-3-26 17:53:16
Conference proceedings 2010earch impetus in AIS had a clear focus on applying immunological principles to c- putationalproblemsinpracticaldomainssuchascomputersecurity,datamining and optimization. As the ?eld has matured, it has diversi?ed such that we now see a growing interest in formalizing the theoretical properties of ea