Author of the publication

A Generation Method of Immunological Memory in Clonal Selection Algorithm by Using Restricted Boltzmann Machines.

, and . SMC, page 2660-2665. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fine tuning method by using knowledge acquisition from Deep Belief Network., and . IWCIA, page 119-124. IEEE, (2016)A Distillation Learning Model of Adaptive Structural Deep Belief Network for AffectNet: Facial Expression Image Database., and . IIAI-AAI, page 450-455. IEEE, (2020)Ant Colony Optimization using exploratory ants for constructing partial solutions., , , and . IEEE Congress on Evolutionary Computation, page 1-7. IEEE, (2010)A Generation Method of Immunological Memory in Clonal Selection Algorithm by Using Restricted Boltzmann Machines., and . SMC, page 2660-2665. IEEE, (2015)A Clonal Selection Algorithm with Levenshtein Distance Based Image Similarity in Multidimensional Subjective Tourist Information and Discovery of Cryptic Spots by Interactive GHSOM., and . SMC, page 2085-2090. IEEE, (2013)A generation method of filtering rules of Twitter via smartphone based Participatory Sensing system for tourist by interactive GHSOM and C4.5., and . SMC, page 110-115. IEEE, (2012)Clustering and retrieval method of immunological memory cell in clonal selection algorithm., and . SCIS&ISIS, page 1351-1356. IEEE, (2012)Human Communication Network Based on the Classification Results of Personal Preferences by Using Self-Organizing Map., , , and . SMC, page 418-423. IEEE, (2009)An Object Detection by using Adaptive Structural Learning of Deep Belief Network., and . IJCNN, page 1-8. IEEE, (2019)Extraction of Rules from Coronary Heart Disease Database Using Automatically Defined Groups., , , and . KES, volume 3214 of Lecture Notes in Computer Science, page 1089-1096. Springer, (2004)