بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
cnn algorithm » rd algorithm (توسيع البحث), colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
cnn algorithm » rd algorithm (توسيع البحث), colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
-
2
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
منشور في 2025"…The BRNN model, refined using the Adagrad optimization algorithm, efficiently integrates the learned features from both branches. …"
-
3
Social spider optimization algorithm: survey and new applications
منشور في 2024"…Based on gender, evolutionary factors simulate different behaviors usually found at their settlement based on the biological aspect. This survey studied the SSO and compared it with other PSO algorithms to find the best-performing algorithm based on a benchmark. …"
احصل على النص الكامل
-
4
-
5
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
-
6
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
منشور في 2016"…Then, it searches for population discriminative motifs or differentiable sequence of SNPs, by implementing Probabilistic Suffix Trees data structures. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
7
-
8
Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives
منشور في 2005"…The proposed GFLC is developed to have less computational burden, which makes it suitable for real-time implementation. The parameters for the GFLC are tuned by genetic algorithm (GA). …"
احصل على النص الكامل
article -
9
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
منشور في 2002"…We adjust and modify a GF(2n) Montgomery inverse algorithm to benefit from multi-bit shifting hardware features making it very similar to the proposed best design of GF(p) inversion hardware. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
10
-
11
Image-Based Air Quality Estimation Using Convolutional Neural Network Optimized by Genetic Algorithms: A Multi-Dataset Approach
منشور في 2025"…<p dir="ltr">Air pollution poses significant threats to human health and the environment, making effective monitoring increasingly essential. …"
-
12
-
13
Boosting the visibility of services in microservice architecture
منشور في 2023"…Our research also analyzed the boosting algorithms, namely Gradient Boost, XGBoost, LightGBM, and CatBoost to improve the overall performance. …"
-
14
-
15
-
16
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
منشور في 2014"…GFT (Genetic Fuzzimetric Technique) is of no exception which merges Fuzzy logic with genetic algorithm to achieve the optimization of the decision making process under uncertainty. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
17
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
18
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
-
20
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"