Knightd-deOaos Tours Using a Neural Network 1.0

Dmitry Brant in Multimedia \ Drawing and CAD

Generates knightd-deOaos tours using a neural network algorithm. There was a paper in an issue of Neurocomputing that got me intrigued: it spoke of a neural network solution to the knightd-deOaos tour problem. I decided to write a quick C++ implementation to see for myself, and the results, although limited, were thoroughly fascinating. The neural network is designed such that each legal knightd-deOaos move on the chessboard is represented...


   
 
Related Software

mysys 4.9.0 IntegriTech Inc.  File & Disk Management

A Window into your System! Do you have alot of files? Do you spend too much time navigating hundreds of folders? Do you sometimes forget where a file is? mysys will be your new home away from all the pesky folders! News Flash: Version 2 now reads the file tables directly dramatically improving...

EDGE Diagrammer 7.00.2170 Pacestar Software  Graphic Editors

Professional diagramming, flowcharting, and design tool. Uniquely tailored for easy use with little or no training required. Create any type of block or flow diagrams. Use built in shapes and arrowheads or create your own. Contains all the features of expensive packages such as full zoom, OLE...

System Mechanic Professional 22.3 RealDefense LLC  Maintenance

System Mechanic Pro uses patented technology to restore speed, power, and stability to your PC. It fixes errors, boosts performance, defends against infections, and proactively prevents problems from reoccurring. This all-in-one solution to complete Windows care also recovers deleted files,...

SoftPerfect Network Scanner 8.1.4 SoftPerfect  Server

SoftPerfect Network Scanner is a fast universal IPv4/IPv6 scanner for Windows and macOS. It is intended for both system administrators and general users interested in computer security. The software can ping computers, scan ports, discover shared folders and comes with flexible filtering and...

LanFlow Net Diagrammer 6.99.2169 Pacestar Software  Misc. Network

LanFlow is a drawing tool for laying out, designing, and documenting a network, LAN, internet,vector or other communications system. Drop in components like computers, workstations, routers, and servers and connect them with lines and cables. Choose components from built in symbols and clip art...

UFS Explorer Standard Recovery 9.6 SysDev Laboratories LLC  File & Disk Management

UFS Explorer Standard Recovery embraces sophisticated techniques that make it easy to recover accidentally deleted files and data lost due to logical damage after formatting, hardware or software crashes, malware attacks, etc. The program supports a wide range of file systems used in different...

Automate 11.6.10.49 HelpSystems LLC.  Misc. Utils.

Automate sets an entirely new standard for server and desktop automation. Built on the experience earned from delivering automation to more than 9000 sites across 40 countries, Automate now adds the power of virtual and cloud-based computing environments, plus improved web-app interaction, to its...

NCheck Bio Attendance Trial for Windows 5.1.23 Neurotechnology  Applications

NCheck Bio Attendance is an automatic ready-to-use time tracking system with biometric fingerprint and face identification. May be used from employee attendance control to check-in at events, clubs, clinics, etc. Protection against human-factor errors or user fraud. Employee GPS logging...

SentiVeillance SDK Trial 8.1 Neurotechnology  Microsoft.Net

Real-time biometric facial recognition and pedestrian or vehicle tracking in live video streams. Available as SDK (software developing kit) for technology integration into small and large surveillance systems. The proprietary technology provides automatic operation with multiple face detection,...

GlassWire Firewall 2.3.397 GlassWire  Firewalls

GlassWire's free firewall software helps protect your privacy & security by monitoring your network activity for suspicious activity. You'll be shocked by how many applications on your computer are sending your private data over the Internet without you knowing. Once suspicious activity is...