يعرض 1 - 20 نتائج من 79 نتيجة بحث عن '(((( experiments new algorithm ) OR ( complement _ algorithm ))) OR ( neural coding algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) حسب Lamaa, Karine H.

    منشور في 2018
    "…Our experiments on a variety of social (sub) networks show that our algorithms can almost always manage to extract a small set of influencers through which we can effectively propagate a message throughout the whole network.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 12

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…However, these methods are not always well founded because they depend heavily on the physician’s experience. Hence, there is a great need for a new automated approach in order to make diagnosis more reliable. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods حسب Abu Zitar, Raed

    منشور في 2023
    "…An Enhanced Chameleon Swarm Algorithm (ECSA) by integrating roulette wheel selection and Lévy flight methods is presented to solve non-convex Economic Load Dispatch (ELD) problems. …"
    احصل على النص الكامل
  14. 14

    Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing حسب Abualigah, Laith

    منشور في 2024
    "…The Jaya algorithm's ability to exploit the current best solutions is complemented by the SSO's collaborative search strategy, resulting in a synergistic optimization framework. …"
    احصل على النص الكامل
  15. 15

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering حسب Abu Zitar, Raed

    منشور في 2022
    "…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …"
  16. 16

    A dynamically turbo-charged heuristic for graph coloring. (c2018) حسب Chahine, Bachir

    منشور في 2018
    "…The recently introduced turbo-charging idea is further enhanced in this thesis by introducing a dynamic version of turbo-charging where the moment of regret and the rollback points are determined dynamically. Experiments comparing our turbo-charging algorithm to other heuristics were conducted on a number of known benchmarks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 17

    Efficient Approximate Conformance Checking Using Trie Data Structures حسب Awad, Ahmed

    منشور في 2021
    "…In this paper, we contribute a new formulation of the proxy behavior derived from a model for approximate conformance checking. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  18. 18

    On-site workshop investment problem: A novel mathematical approach and solution procedure حسب Nima Moradi (19418821)

    منشور في 2023
    "…Next, due to the NP-hardness of the problem, an enhanced Genetic Algorithm (GA)-based metaheuristic with efficient problem-specific improvement rules as local search and effective crossover and mutation operators is proposed. …"
  19. 19

    Boosting the visibility of services in microservice architecture حسب Ahmet Vedat Tokmak (17773479)

    منشور في 2023
    "…Recent SOA implementations made use of cloud-native architectural approaches such as microservice architecture, which has resulted in a new challenge: the discovery difficulties of services. …"
  20. 20

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
    احصل على النص الكامل