بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
-
161
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
منشور في 1999"…A new implementation of the genetic algorithm is introduced. …"
احصل على النص الكامل
احصل على النص الكامل
article -
162
A new tabu search algorithm for the long-term hydro scheduling problem
منشور في 2002"…A new efficient algorithm to solve the long-term hydro scheduling problem (LTHSP) is presented in this paper. …"
احصل على النص الكامل
احصل على النص الكامل
article -
163
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
منشور في 2020"…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
-
164
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
-
165
Content-Aware Adaptive Video Streaming Using Actor-Critic Deep Reinforcement Learning
منشور في 2024احصل على النص الكامل
doctoralThesis -
166
-
167
Data Generation for Path Testing
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
168
An enhanced quorum selection algorithm
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
169
An Improved Quorum Selection Algorithm
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
170
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
171
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…Different classification algorithms were applied to the dataset using the Rapidminer tool. …"
احصل على النص الكامل
-
172
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
-
173
-
174
Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem
منشور في 2020"…A new implementation of the genetic algorithm is introduced. …"
احصل على النص الكامل
article -
175
Implementation of trust region methods in optimization. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
176
Correlation Clustering with Overlaps
منشور في 2020"…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
177
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
-
178
-
179
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
منشور في 2012"…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
180
Boosting the visibility of services in microservice architecture
منشور في 2023"…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"