Search alternatives:
where optimization » whale optimization (Expand Search), ahead optimization (Expand Search), swarm optimization (Expand Search)
wolf optimization » whale optimization (Expand Search), policy optimization (Expand Search), swarm optimization (Expand Search)
where optimization » whale optimization (Expand Search), ahead optimization (Expand Search), swarm optimization (Expand Search)
wolf optimization » whale optimization (Expand Search), policy optimization (Expand Search), swarm optimization (Expand Search)
-
1
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
Published 2023“…The results were obtained optimally, and we got 18 models, where each one had different high accurate outputs, that classify an individual to user and non-user. …”
Get full text
-
2
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
Published 2020“…Based on the proposed algorithm, several IPT systems are optimized in MATLAB software using Genetic Algorithm (GA). …”
-
3
-
4
Socially Motivated Approach to Simulate Negotiation Process
Published 2014Get full text
doctoralThesis -
5
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
Published 2013Get full text
Get full text
masterThesis -
6
-
7
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
8
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
9
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…This proposed system is ideal in cases where mathematical modeling either does not exist or insufficient for appropriate decision making under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…This increase could also be exploited as a side channel for embedding watermark synchronization recovery data. Finally, the analytical expressions are contrasted with experimental results where the robustness of the proposed watermarking system is evaluated against standard watermarking attacks.…”
Get full text
article