بدائل البحث:
where optimization » whale optimization (توسيع البحث), ahead optimization (توسيع البحث), swarm optimization (توسيع البحث)
wolf optimization » whale optimization (توسيع البحث), policy optimization (توسيع البحث), swarm optimization (توسيع البحث)
where optimization » whale optimization (توسيع البحث), ahead optimization (توسيع البحث), swarm optimization (توسيع البحث)
wolf optimization » whale optimization (توسيع البحث), policy optimization (توسيع البحث), swarm optimization (توسيع البحث)
-
1
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
منشور في 2023"…The results were obtained optimally, and we got 18 models, where each one had different high accurate outputs, that classify an individual to user and non-user. …"
احصل على النص الكامل
-
2
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
منشور في 2020"…Based on the proposed algorithm, several IPT systems are optimized in MATLAB software using Genetic Algorithm (GA). …"
-
3
-
4
Socially Motivated Approach to Simulate Negotiation Process
منشور في 2014احصل على النص الكامل
doctoralThesis -
5
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
6
-
7
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
منشور في 2019احصل على النص الكامل
doctoralThesis -
8
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis -
9
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…This proposed system is ideal in cases where mathematical modeling either does not exist or insufficient for appropriate decision making under uncertainty. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
Digital Image Watermarking Using Balanced Multiwavelets
منشور في 2006"…This increase could also be exploited as a side channel for embedding watermark synchronization recovery data. Finally, the analytical expressions are contrasted with experimental results where the robustness of the proposed watermarking system is evaluated against standard watermarking attacks.…"
احصل على النص الكامل
article