يعرض 1 - 6 نتائج من 6 نتيجة بحث عن '(( primary data 1 optimization algorithm ) OR ( binary pre processing optimization algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing حسب Jincheng Zhou (1887307)

    منشور في 2023
    "…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
  2. 2
  3. 3

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques حسب Arifa Zahir (20748764)

    منشور في 2024
    "…Given the ongoing challenges in agriculture, there is a belief that incorporating the latest technologies is crucial. The primary objective of this study is to explore how Deep Learning algorithms can be beneficial in categorizing agricultural records, particularly in monitoring and identifying variations in spring wheat germplasm. …"
  4. 4

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …"
    احصل على النص الكامل
  5. 5

    Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas حسب Marwan Dhuheir (19170898)

    منشور في 2024
    "…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …"
  6. 6

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"