بدائل البحث:
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
261
-
262
Graph Contraction for Mapping Data on Parallel Computers
منشور في 1994"…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, genetic algorithm and simulated annealing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
263
Mapping realistic data sets on parallel computers
منشور في 1993"…The GC algorithm allows large-scale mapping to become efficient, especially when slow but high-quality mappers are used.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
264
Parallel genetic algorithm for disease-gene association
منشور في 2011"…In this work, we combine few successful strategies from the literature and present a parallel genetic algorithm for the Tag SNP Selection problem. Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
265
Particle swarm optimization algorithm: review and applications
منشور في 2024"…The main procedure of the PSO algorithm is presented. Future researchers can use the collected data in this survey as baseline information on the PSO and PSO's applications.…"
احصل على النص الكامل
-
266
New enumeration algorithm for regular boolean functions
منشور في 2018"…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
267
-
268
Spider monkey optimizations: application review and results
منشور في 2024"…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …"
احصل على النص الكامل
-
269
-
270
Convergence behavior of the normalized least mean fourth algorithm
منشور في 2000"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
احصل على النص الكامل
احصل على النص الكامل
article -
271
Three-phase simulated annealing algorithms for exam scheduling
منشور في 2003"…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
272
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
منشور في 2023"…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …"
احصل على النص الكامل
-
273
Mining airline data for CRM strategies. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
274
A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS
منشور في 2020"…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …"
احصل على النص الكامل
article -
275
A hybrid graph representation for recursive backtracking algorithms
منشور في 2017"…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
276
Social spider optimization algorithm: survey and new applications
منشور في 2024"…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …"
احصل على النص الكامل
-
277
-
278
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
279
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
280
A comparison of optimization heuristics for the data mapping problem
منشور في 1997"…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article