بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
221
Spider monkey optimizations: application review and results
منشور في 2024"…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …"
احصل على النص الكامل
-
222
Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models
منشور في 2022"…Deep learning is the most promising algorithm compared to another Machine Learning (ML) algorithm. …"
احصل على النص الكامل
-
223
-
224
Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control
منشور في 2021"…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. …"
-
225
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
منشور في 2023"…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …"
-
226
Cuckoo search for portfolio optimization. (c2014)
منشور في 2014احصل على النص الكامل
احصل على النص الكامل
masterThesis -
227
-
228
-
229
The effects of data balancing approaches: A case study
منشور في 2023"…Our results showed that the replacement method was effective, and LogisticRegression combined with the oversampling algorithms SMOTE or ADASYN, GaussianProcessClassifier with the oversampling algorithm SMOTE, and LinearDiscriminantAnalysis were the best performing models after log transformation of the dataset was followed by Recursive Feature Elimination.…"
-
230
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…The accuracy of these models largely depends on the size and quality of the training dataset. …"
-
231
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
منشور في 2023"…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …"
احصل على النص الكامل
-
232
Intelligent Rapidly-Exploring Random Tree Star Algorithm
منشور في 2024احصل على النص الكامل
doctoralThesis -
233
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
234
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
235
A neural networks algorithm for data path synthesis
منشور في 2003"…The algorithm is driven by a motion equation that determines the neurons firing conditions based on the modified Hopfield neural network model of computation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
236
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
منشور في 2023"…Additionally, our proposed model optimizes the features using a genetic algorithm. …"
-
237
Formal synthesis of VLSI layouts from algorithmic specifications
منشور في 2020"…This formal high level syntesis system uses recursive algorithms to model the behaviour to be synthesized. …"
احصل على النص الكامل
article -
238
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
239
A hybrid graph representation for recursive backtracking algorithms
منشور في 2017"…The performance of these algorithms often suffers from the increasing number of graph modifications, such as deletions, that reduce the problem instance and have to be “taken back” frequently during the search process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
240
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
منشور في 2010احصل على النص الكامل
doctoralThesis