{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:12:59Z","timestamp":1742933579187,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319466743"},{"type":"electronic","value":"9783319466750"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46675-0_36","type":"book-chapter","created":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T09:55:47Z","timestamp":1475056547000},"page":"326-334","source":"Crossref","is-referenced-by-count":0,"title":["A GPU Implementation of a Bat Algorithm Trained Neural Network"],"prefix":"10.1007","author":[{"given":"Amit Roy","family":"Choudhury","sequence":"first","affiliation":[]},{"given":"Rishabh","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Kapil","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,29]]},"reference":[{"issue":"3","key":"36_CR1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/175247.175257","volume":"37","author":"B Widrow","year":"1994","unstructured":"Widrow, B., Rumelhart, D.E., Lehr, M.A.: Neural networks: applications in industry, business and science. Commun. ACM 37(3), 93\u2013106 (1994)","journal-title":"Commun. ACM"},{"issue":"6","key":"36_CR2","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/72.97934","volume":"2","author":"DF Specht","year":"1991","unstructured":"Specht, D.F.: A general regression neural network. IEEE Trans. Neural Netw. 2(6), 568\u2013576 (1991)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"6","key":"36_CR3","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/72.329697","volume":"5","author":"MT Hagan","year":"1994","unstructured":"Hagan, M.T., Menhaj, M.B.: Training feedforward networks with the Marquardt algorithm. IEEE Trans. Neural Netw. 5(6), 989\u2013993 (1994)","journal-title":"IEEE Trans. Neural Netw."},{"key":"36_CR4","unstructured":"Montana, D.J., Davis, L.: Training feedforward neural networks using genetic algorithms. In: IJCAI, vol. 89, pp. 762\u2013767, August 1989"},{"issue":"6","key":"36_CR5","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1016\/S0305-0483(99)00027-4","volume":"27","author":"JN Gupta","year":"1999","unstructured":"Gupta, J.N., Sexton, R.S.: Comparing backpropagation with a genetic algorithm for neural network training. Omega 27(6), 679\u2013684 (1999)","journal-title":"Omega"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Gudise, V.G., Venayagamoorthy, G.K.: Comparison of particle swarm optimization and backpropagation as training algorithms for neural networks. In: Proceedings of the 2003 IEEE Swarm Intelligence Symposium, 2003. SIS 3003, pp. 110\u2013117. IEEE, April 2003","DOI":"10.1109\/SIS.2003.1202255"},{"issue":"7","key":"36_CR7","first-page":"23","volume":"4","author":"K Khan","year":"2012","unstructured":"Khan, K., Sahai, A.: A comparison of BA, GA, PSO, BP and LM for training feed forward neural networks in e-learning context. Int. J. Intell. Syst. Appl. 4(7), 23 (2012)","journal-title":"Int. J. Intell. Syst. Appl."},{"key":"36_CR8","series-title":"Studies in Computational Intelligence","first-page":"64","volume-title":"Nature Inspired Cooperative Strategies for Optimization (NICSO 2010)","author":"XS Yang","year":"2010","unstructured":"Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Gonz\u00e1lez, J.R., Pelta, D.A., Cruz, C., Terrazas, G., Krasnogor, N. (eds.) NICSO 2010. Studies in Computational Intelligence, vol. 284, pp. 64\u201374. Springer, Heidelberg (2010)"},{"key":"36_CR9","unstructured":"Nvidia, C.U.D.A.: C programming guide version 4.0. NVIDIA Corporation, Santa Clara (2011)"},{"key":"36_CR10","unstructured":"Lichman, M.: UCI machine learning repository. University of California, School of Information and Computer Science, Irvine (2013). http:\/\/archive.ics.uci.edu\/ml"},{"key":"36_CR11","unstructured":"Harris, M.: Optimizing parallel reduction in CUDA. NVIDIA DeveloperTechnology 2(4), (2007). http:\/\/developer.download.nvidia.com\/assets\/cuda\/files\/reduction.pdf"},{"key":"36_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"K Rieck","year":"2008","unstructured":"Rieck, K., Holz, T., Willems, C., D\u00fcssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108\u2013125. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46675-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:52:51Z","timestamp":1498333971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46675-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319466743","9783319466750"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46675-0_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}