بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
pooled using » problem using (توسيع البحث), tool using (توسيع البحث), tools using (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
pooled using » problem using (توسيع البحث), tool using (توسيع البحث), tools using (توسيع البحث)
-
1
The buffered work-pool approach for search-tree based optimization algorithms
منشور في 2017"…This new trend has been motivated by hardness of approximation results that appeared in the last decade, and has taken a great boost by the emergence of parameterized complexity theory. Exact algorithms often follow the classical search-tree based recursive backtracking strategy. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
2
-
3
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
4
Teaching–learning-based optimization algorithm: analysis study and its application
منشور في 2024الموضوعات: "…Teaching–learning-based optimization algorithm…"
احصل على النص الكامل
-
5
Web Based Online Hybrid Teaching Method of Network Music Course
منشور في 2022"…In the context of big data, the lengthy personalized screening process of users has become one of the problems to be solved. Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …"
احصل على النص الكامل
-
6
-
7
Power based scheduling algorithms for WCDMA networks
منشور في 2006احصل على النص الكامل
masterThesis -
8
-
9
Metaheuristic Algorithm for State-Based Software Testing
منشور في 2018"…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
10
-
11
-
12
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021الموضوعات: احصل على النص الكامل
احصل على النص الكامل
-
13
An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling
منشور في 2016"…Several nonlinear optimization models were developed for this purpose assuming uniform resource availability and sequence based project tasks. The work presented in thesis add to the existing literature in a proposing the use of a genetic algorithm uncertain approach to resource- scheduling in projects. …"
احصل على النص الكامل
-
14
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…The slime mould algorithm (SMA) gives good results in finding the best solutions to optimization problems. …"
احصل على النص الكامل
-
15
Compressed sensing based image denoising: novel patch-based collaborative algorithms
منشور في 2020احصل على النص الكامل
masterThesis -
16
Join algorithms for parallel computers for relations based on interpolation based grid file
منشور في 1991احصل على النص الكامل
masterThesis -
17
-
18
Error detection in algorithm-based fault tolerant systems
منشور في 2000احصل على النص الكامل
masterThesis -
19
-
20
A matrix-based damage assessment and recovery algorithm
منشور في 2014"…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject