بدائل البحث:
due optimization » dog optimization (توسيع البحث), _ optimization (توسيع البحث), based optimization (توسيع البحث)
based process » batch process (توسيع البحث)
due optimization » dog optimization (توسيع البحث), _ optimization (توسيع البحث), based optimization (توسيع البحث)
based process » batch process (توسيع البحث)
-
1
-
2
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
منشور في 2023"…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
-
3
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
منشور في 2024"…Given the ongoing challenges in agriculture, there is a belief that incorporating the latest technologies is crucial. The primary objective of this study is to explore how Deep Learning algorithms can be beneficial in categorizing agricultural records, particularly in monitoring and identifying variations in spring wheat germplasm. …"
-
4
Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas
منشور في 2024"…<p dir="ltr">Over the past decade, Unmanned Aerial Vehicles (UAVs) have attracted significant attention due to their potential applications in emergency-response applications, including wireless power transfer (WPT) and data collection from Internet of Things (IoT) devices in disaster-affected areas. …"
-
5
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
منشور في 2023"…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"
-
6
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"