There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
Classification methods from statistical pattern recognition, neural nets, and machine learning were applied to four real-world data sets. Each of these data sets has been previous...
The application of boosting technique to the regression problems has received relatively little attention in contrast to the research aimed at classification problems. This paper ...
This paper reports work done to improve the modeling of complex processes when only small experimental data sets are available. Neural networks are used to capture the nonlinear un...
W. D. Wan Rosli, Z. Zainuddin, R. Lanouette, S. Sa...
A series of evolutionary neural network simulations are presented which explore the hypothesis that learning factors can result in the evolution of long periods of parental protec...