Y Tang, Z Song, Y Zhu, M Hou, C Tang, J Ji - Expert Systems with …, 2022 - Elsevier
Financial time series forecasting has been an attractive application of machine learning techniques because an advanced forecasting method can help to accurately predict price …
The well-known optimization approach teaching-learning-based optimization (TLBO) is modified by using a confined TLBO (CTLBO) to eliminate the teaching factor. Different …
In this Chapter, the initial Sects. 2.1–2.4 give detailed analysis on types of metaheuristics namely Genetic Algorithm, Particle Swarm Optimization, Differential Evolution algorithm and …
Q Yang, JW Ji, X Lin, XM Hu, XD Gao, PL Xu… - Expert Systems with …, 2024 - Elsevier
Hybridizing multiple mutation strategies has shown much effectiveness in helping differential evolution (DE) algorithms achieve good optimization performance. Though abundant …
H Zaheer, M Pant - 2016 International Conference on Electrical …, 2016 - ieeexplore.ieee.org
Portfolio theories best describes the asset management. Several investment offers are available to a customer and the task is to select the most appropriate option to gain the …
K Kashyap, TK Sharma, J Rajpurohit - International Journal of System …, 2020 - Springer
Differential evolution (DE) is a popular evolutionary technique which can be applied in various constrained and unconstrained optimization problems along with the real time …
P Kumar, M Pant - International Journal of System Assurance Engineering …, 2018 - Springer
Differential evolution (DE) algorithm is come out as a leading tool for solving many real life optimization problems since last few years. Modified random localized DE (MRLDE) is an …
S Rastogi, H Zaheer - Social network analysis and mining, 2016 - Springer
Congestion control in today's Internet is an important issue. Congestion control algorithms have been extensively studied for managing the traffic and maintaining the stability in the …
IA Ansari, M Pant, CW Ahn - … of Fifth International Conference on Soft …, 2016 - Springer
The present study proposed a robust and secure watermarking scheme to authenticate the digital images for ownership claim. The proposed watermarking scheme is making use of 2 …