Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 878262, 8 pages
http://dx.doi.org/10.1155/2014/878262
Research Article

Novel Back Propagation Optimization by Cuckoo Search Algorithm

School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, Hunan 410014, China

Received 1 January 2014; Accepted 16 February 2014; Published 20 March 2014

Academic Editors: S.-F. Chien, T. O. Ting, and X.-S. Yang

Copyright © 2014 Jiao-hong Yi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [6 citations]

The following is the list of published articles that have cited the current article.

  • E. Osaba, F. Diaz, R. Carballedo, E. Onieva, and A. Perallos, “Focusing on the Golden Ball Metaheuristic: An Extended Study on a Wider Set of Problems,” The Scientific World Journal, vol. 2014, pp. 1–17, 2014. View at Publisher · View at Google Scholar
  • Rajashree Nayak, Saka Harshavardhan, and Dipti Patra, “Morphology based iterative back-projection for super-resolution reconstruction of image,” Proceedings on 2014 2nd International Conference on "Emerging Technology Trends in Electronics, Communication and Networking", ET2ECN 2014, 2015. View at Publisher · View at Google Scholar
  • Rekha Lakshmanan, Shiji T. P., Suma Mariam Jacob, Thara Pratab, Chinchu Thomas, and Vinu Thomas, “Detection of architectural distortion in mammograms using geometrical properties of thinned edge structures,” Intelligent Automation & Soft Computing, vol. 23, no. 1, pp. 183–197, 2017. View at Publisher · View at Google Scholar
  • Hui Hu, Zhaoquan Cai, Song Hu, Yingxue Cai, Jia Chen, and Sibo Huang, “Improving Monarch Butterfly Optimization Algorithm with Self-Adaptive Population,” Algorithms, vol. 11, no. 5, pp. 71, 2018. View at Publisher · View at Google Scholar
  • Senyu Li, Fangming Bi, Wei Chen, Xuzhi Miao, Jin Liu, and Chaogang Tang, “An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking,” IEEE Access, vol. 6, pp. 10311–10319, 2018. View at Publisher · View at Google Scholar
  • Tarik A. Rashid, Polla Fattah, and Delan K. Awla, “Using Accuracy Measure for Improving the Training of LSTM with Metaheuristic Algorithms,” Procedia Computer Science, vol. 140, pp. 324–333, 2018. View at Publisher · View at Google Scholar