Search alternatives:
model optimization » level optimization (Expand Search), motor optimization (Expand Search), monkey optimizations (Expand Search)
aim » aims (Expand Search)
model optimization » level optimization (Expand Search), motor optimization (Expand Search), monkey optimizations (Expand Search)
aim » aims (Expand Search)
-
1
-
2
Multiclass feature selection with metaheuristic optimization algorithms: a review
Published 2022“…The feature selection problem aims at reducing the feature set dimension while maintaining the performance model accuracy. …”
Get full text
-
3
Multi-Objective Co-optimization of Power and Gas under Uncertainties with P2H embedded
Published 2022Get full text
doctoralThesis -
4
Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine
Published 2024“…Lastly, a newly improved learning algorithm encompasses a modified pelican optimization algorithm (MOD-POA) and an extreme learning machine (ELM) for classification tasks. …”
-
5
-
6
-
7
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
8
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
9
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
10
Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas
Published 2024“…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …”
-
11
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
12
From Collatz Conjecture to chaos and hash function
Published 2023“…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …”