يعرض 1 - 16 نتائج من 16 نتيجة بحث عن '(( binary a model optimization algorithm ) OR ( primary goal based optimization algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm حسب Amirsajjad Rahmani (17541453)

    منشور في 2023
    "…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …"
  3. 3

    Multiclass feature selection with metaheuristic optimization algorithms: a review حسب Abu Zitar, Raed

    منشور في 2022
    "…Nevertheless, metaheuristic algorithms attract substantial attention to solving different problems in optimization. …"
    احصل على النص الكامل
  4. 4
  5. 5

    An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications حسب Abu Zitar, Raed

    منشور في 2021
    "…Initially, the optimization model and convergence characteristics of JAYA algorithm are carefully analyzed. …"
    احصل على النص الكامل
  6. 6

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …"
    احصل على النص الكامل
  7. 7
  8. 8
  9. 9

    An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study حسب Sara Al-Haidous (18095368)

    منشور في 2022
    "…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …"
  10. 10

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns حسب Md Ferdous Wahid (13485799)

    منشور في 2023
    "…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"
  11. 11

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine حسب Debendra Muduli (20748758)

    منشور في 2024
    "…Lastly, a newly improved learning algorithm encompasses a modified pelican optimization algorithm (MOD-POA) and an extreme learning machine (ELM) for classification tasks. …"
  12. 12

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل
  13. 13

    A method for data path synthesis using neural networks حسب Harmanani, H.

    منشور في 2017
    "…Presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 14
  15. 15

    Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes حسب Muhammad Mohsin Khan (22150360)

    منشور في 2025
    "…Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …"
  16. 16

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …"