Search alternatives:
1 optimization » _ optimization (Expand Search), dog optimization (Expand Search), igdt optimization (Expand Search)
pre processing » _ processing (Expand Search), image processing (Expand Search)
binary pre » binary pdm (Expand Search)
data 1 » data _ (Expand Search)
1 optimization » _ optimization (Expand Search), dog optimization (Expand Search), igdt optimization (Expand Search)
pre processing » _ processing (Expand Search), image processing (Expand Search)
binary pre » binary pdm (Expand Search)
data 1 » data _ (Expand Search)
-
1
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
2
-
3
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
Published 2024“…Given the ongoing challenges in agriculture, there is a belief that incorporating the latest technologies is crucial. The primary objective of this study is to explore how Deep Learning algorithms can be beneficial in categorizing agricultural records, particularly in monitoring and identifying variations in spring wheat germplasm. …”
-
4
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …”
Get full text
-
5
Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas
Published 2024“…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …”
-
6
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”