Search alternatives:
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
developments » development (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
developments » development (Expand Search)
-
1
Social spider optimization algorithm: survey and new applications
Published 2024“…This algorithm has been developed over time, resulting in many versions besides theories and findings. …”
Get full text
-
2
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
3
A Scatter search algorithm for exam scheduling. (c2006)
Published 2006Get full text
Get full text
masterThesis -
4
Development of Energy-efficient Algorithms for Wireless Sensor Networks
Published 2020Get full text
masterThesis -
5
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
6
Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems
Published 2022“…Therefore, the paper discusses the development of the Lévy flight-based reptile search algorithm with local search capability and evaluates its potential against challenging power systems engineering optimization problems. …”
Get full text
-
7
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…In this paper, the most important literature and previous studies related to the subject of the study were presented, where nearly 30 researches were referred to develop a theoretical framework related to SSA and other improved algorithms and to compare SSA with other systems. …”
Get full text
-
8
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
9
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
10
-
11
Web Based Online Hybrid Teaching Method of Network Music Course
Published 2022“…Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …”
Get full text
-
12
Arithmetic optimization algorithm: a review and analysis
Published 2024“…A metaheuristic algorithm called arithmetic optimization algorithm (AOA) is developed to solve various optimization problems. …”
Get full text
-
13
Topics in graph algorithms
Published 2003“…Coping with computational intractability has inspired the development of a variety of algorithmic techniques. …”
Get full text
Get full text
Get full text
masterThesis -
14
-
15
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
Get full text
Get full text
-
16
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
17
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The search accomplished by three types of bees over a number of iterations aiming to find the source with the highest nectar value (fitness value of a candidate solution). We apply the Bee Colony algorithm to previously published data. …”
Get full text
Get full text
Get full text
article -
18
-
19
Kernelization algorithms for the vertex cover problem
Published 2017Get full text
Get full text
Get full text
conferenceObject -
20
An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling
Published 2016“…The proposed algorithm out performed fairly well the results that exists from previous studies. …”
Get full text