Ara
Toplam kayıt 6, listelenen: 1-6
The Best Approximation of Generalized Fuzzy Numbers Based on Scaled Metric
(Hindawi Limited., 2022)
The ongoing study has been vehemently allocated to propound an ameliorated α-weighted generalized approximation of an arbitrary fuzzy number. This method sets out to lessen the distance between the original fuzzy set and ...
Parallel Molecular Alteration Between Alzheimer’s Disease and Major Depressive Disorder in the Human Brain Dorsolateral Prefrontal Cortex: An İnsight From Gene Expression and Methylation Profile Analyses
(The Genetics Society of Japan, 2023)
Alzheimer’s disease (AD) and major depressive disorder (MDD) are comorbid
neuropsychiatric disorders that are among the leading causes of long-term disability worldwide. Recent research has indicated the existence of ...
Chaotic Sand Cat Swarm Optimization
(MDPI, 2023)
In this study, a new hybrid metaheuristic algorithm named Chaotic Sand Cat Swarm Optimization (CSCSO) is proposed for constrained and complex optimization problems. This algorithm
combines the features of the recently ...
A Bioinspired Discrete Heuristic Algorithm to Generate the Eeffective Structural Model of a Program Source Code
(Elsevier, 2023)
When the source code of a software is the only product available, program understanding has a substantial
influence on software maintenance costs. The main goal in code comprehension is to extract information
that is ...
A Bioinspired Test Generation Method Using Discretized and Modified Bat Optimization Algorithm
(MDPI, 2024)
The process of software development is incomplete without software testing. Software
testing expenses account for almost half of all development expenses. The automation of the testing
process is seen to be a technique ...
Detecting SQL Injection Attacks by Binary Gray Wolf Optimizer and Machine Learning Algorithms
(Springer, 2024)
SQL injection is one of the important security issues in web applications because it allows an attacker to interact with the
application’s database. SQL injection attacks can be detected using machine learning algorithms. ...