Swarm Intelligence and Bio-Inspired Computation 2013
DOI: 10.1016/b978-0-12-405163-8.00012-0
|View full text |Cite
|
Sign up to set email alerts
|

Bio-Inspired Models for Semantic Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…The SOM algorithm applied in the application example shown below can be summarized in the following sequence of six steps [ 34 ] (Fig. 1 b): Initialization—Initialize randomly all the weights of the connection reference weight vectors ( ).…”
Section: Methodsmentioning
confidence: 99%
“…The SOM algorithm applied in the application example shown below can be summarized in the following sequence of six steps [ 34 ] (Fig. 1 b): Initialization—Initialize randomly all the weights of the connection reference weight vectors ( ).…”
Section: Methodsmentioning
confidence: 99%
“…Neurons are connected to each other through synaptic weight [62]. Considering a neural network with three layers such as in Figure 4: an input layer, a hidden layer and an output layer the intermediate layer is considered self-organized Kohonen map, which consists of two layers of processing units (input and output), depending on the complexity of the network (there may be several hidden layers in each network) [79]. In FFNNs, information progresses, from the input nodes to the hidden nodes and from the hidden nodes to the output nodes.…”
Section: Feedforward Neural Networkmentioning
confidence: 99%
“…Moosa (2010) developed a firewall named ANNbWAF with the purpose to watch such attacks. In this approach, a trained ANN is embedded in the firewall applications where the normal and malicious data is used to give training to the neuron (Sajja and Akerkar, 2013). Many researchers have also designed ANN based algorithms for intrusion detection and proper authentication.…”
Section: Securitymentioning
confidence: 99%
“…Yohanes et al (2013) also implements GA for web crawling and finds the requested web pages. They also proved that GA is better than the traditional crawling methods (Sajja and Akerkar, 2013). Dounias et al (2006) have designed a hybrid technique for image processing and analysis by use of Genetic Algorithms.…”
Section: Genetic Algorithms and Semantic Webmentioning
confidence: 99%
See 1 more Smart Citation