يعرض 1 - 16 نتائج من 16 نتيجة بحث عن '(( binary a while optimization algorithm ) OR ( primary data based optimization algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1
  2. 2

    Multiclass feature selection with metaheuristic optimization algorithms: a review حسب Abu Zitar, Raed

    منشور في 2022
    "…Nevertheless, metaheuristic algorithms attract substantial attention to solving different problems in optimization. …"
    احصل على النص الكامل
  3. 3

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …"
    احصل على النص الكامل
  4. 4

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing حسب Jincheng Zhou (1887307)

    منشور في 2023
    "…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
  5. 5

    A new genetic algorithm approach for unit commitment حسب Mantawy, A.H.

    منشور في 1997
    "…The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks حسب Amirhossein Taherpour (19273879)

    منشور في 2024
    "…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …"
  7. 7
  8. 8

    Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas حسب Marwan Dhuheir (19170898)

    منشور في 2024
    "…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …"
  9. 9

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …"
  10. 10
  11. 11
  12. 12

    Deep and transfer learning for building occupancy detection: A review and comparative analysis حسب Aya Nabil Sayed (17317006)

    منشور في 2022
    "…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …"
  13. 13
  14. 14

    Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes حسب Muhammad Mohsin Khan (22150360)

    منشور في 2025
    "…Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …"
  15. 15

    Towards Multimedia Fragmentation حسب Saad, Samir

    منشور في 2006
    "…We particularly discuss multimedia primary horizontal fragmentation and provide a partitioning strategy based on low-level multi-media features. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 16

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"