These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. Improving the Interpretability of Classification Rules Discovered by an Ant Colony Algorithm: Extended Results. Otero FE; Freitas AA Evol Comput; 2016; 24(3):385-409. PubMed ID: 26066807 [TBL] [Abstract][Full Text] [Related]
3. Dynamic Load Balancing of Software-Defined Networking Based on Genetic-Ant Colony Optimization. Xue H; Kim KT; Youn HY Sensors (Basel); 2019 Jan; 19(2):. PubMed ID: 30646575 [TBL] [Abstract][Full Text] [Related]
4. Ant-cuckoo colony optimization for feature selection in digital mammogram. Jona JB; Nagaveni N Pak J Biol Sci; 2014 Jan; 17(2):266-71. PubMed ID: 24783812 [TBL] [Abstract][Full Text] [Related]
5. Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection. Komadina A; Kovačević I; Štengl B; Groš S Sensors (Basel); 2024 Apr; 24(8):. PubMed ID: 38676253 [TBL] [Abstract][Full Text] [Related]
6. Dynamic Flying Ant Colony Optimization (DFACO) for Solving the Traveling Salesman Problem. Dahan F; El Hindi K; Mathkour H; AlSalman H Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 30999688 [TBL] [Abstract][Full Text] [Related]
7. A short-term operating room surgery scheduling problem integrating multiple nurses roster constraints. Xiang W; Yin J; Lim G Artif Intell Med; 2015 Feb; 63(2):91-106. PubMed ID: 25563674 [TBL] [Abstract][Full Text] [Related]
8. Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installation. Hussain M; Amin R; Gantassi R; Alshehri AH; Frnda J; Raza SM Sci Rep; 2024 Jun; 14(1):14976. PubMed ID: 38951646 [TBL] [Abstract][Full Text] [Related]
9. MOEA/D-ACO: a multiobjective evolutionary algorithm using decomposition and AntColony. Ke L; Zhang Q; Battiti R IEEE Trans Cybern; 2013 Dec; 43(6):1845-59. PubMed ID: 23757576 [TBL] [Abstract][Full Text] [Related]
10. Research on Security Weakness Using Penetration Testing in a Distributed Firewall. Tudosi AD; Graur A; Balan DG; Potorac AD Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904890 [TBL] [Abstract][Full Text] [Related]
11. Modeling the dynamics of ant colony optimization. Merkle D; Middendorf M Evol Comput; 2002; 10(3):235-62. PubMed ID: 12227995 [TBL] [Abstract][Full Text] [Related]
12. The hyper-cube framework for ant colony optimization. Blum C; Dorigo M IEEE Trans Syst Man Cybern B Cybern; 2004 Apr; 34(2):1161-72. PubMed ID: 15376861 [TBL] [Abstract][Full Text] [Related]
13. Performance Evaluation Model for Application Layer Firewalls. Xuan S; Yang W; Dong H; Zhang J PLoS One; 2016; 11(11):e0167280. PubMed ID: 27893803 [TBL] [Abstract][Full Text] [Related]
14. MAGMA: a multiagent architecture for metaheuristics. Milano M; Roli A IEEE Trans Syst Man Cybern B Cybern; 2004 Apr; 34(2):925-41. PubMed ID: 15376840 [TBL] [Abstract][Full Text] [Related]
15. Ant algorithms for discrete optimization. Dorigo M; Di Caro G; Gambardella LM Artif Life; 1999; 5(2):137-72. PubMed ID: 10633574 [TBL] [Abstract][Full Text] [Related]
16. Attractors in Sequence Space: Agent-Based Exploration of MHC I Binding Peptides. Jäger N; Wisniewska JM; Hiss JA; Freier A; Losch FO; Walden P; Wrede P; Schneider G Mol Inform; 2010 Jan; 29(1-2):65-74. PubMed ID: 27463849 [TBL] [Abstract][Full Text] [Related]
17. Ant Colony Optimization With Local Search for Dynamic Traveling Salesman Problems. Mavrovouniotis M; Muller FM; Shengxiang Yang IEEE Trans Cybern; 2017 Jul; 47(7):1743-1756. PubMed ID: 27323387 [TBL] [Abstract][Full Text] [Related]
18. An adaptive detection model for IPv6 extension header threats based on deterministic decision automaton. Lin B; Zhang L; Zhang H; Guo Y; Ge S; Fang Y; Ren M Sci Rep; 2024 Apr; 14(1):9534. PubMed ID: 38664483 [TBL] [Abstract][Full Text] [Related]
19. A novel quality prediction model for component based software system using ACO-NM optimized extreme learning machine. Sheoran K; Tomar P; Mishra R Cogn Neurodyn; 2020 Aug; 14(4):509-522. PubMed ID: 32655714 [TBL] [Abstract][Full Text] [Related]
20. A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC). Jaw E; Wang X PeerJ Comput Sci; 2022; 8():e900. PubMed ID: 35494802 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]