Showing 21 - 40 results of 68 for search '(( algorithm achieved function ) OR ( algorithm archives function ))', query time: 0.08s Refine Results
  1. 21

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…GA is enhanced by adding a multi-objective function, which selects the best features and achieves improved fitness outcomes to explore the essential features and helps minimize dimensions, enhance the true positive rate (TPR), and lower the false positive rate (FPR). …”
  2. 22

    Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems by Agushaka, Jeffrey O.

    Published 2022
    “…The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. In most cases, the results show that solutions achieved by the IDMO are better than those obtained by the existing algorithms.…”
    Get full text
  3. 23

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
  4. 24
  5. 25

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…Experimental results demonstrated that the CatBoost algorithm achieved the highest level of accuracy (90.42%) in predicting microservice quality.…”
  6. 26

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…</p><h3 dir="ltr">Results</h3><p dir="ltr">In the first example, all algorithms achieved similar optimal solutions in the two optimization scenarios, with differences arising primarily in computational efficiency. …”
  7. 27

    A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation by Iman M. Hosseini Naveh (16891482)

    Published 2021
    “…The role of the proposed quasi oppositional based SMPID controller is to modify the tracking strategy on AC/HVDC interconnected systems while reducing the related cost function. The proposed analysis is established considering the most highly cited, well-known tested and newly expanded swarm-based optimization algorithms (SBOAs), such as Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimization (GWO), Artificial Fish Swarm Algorithm (AFSA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). …”
  8. 28
  9. 29

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  10. 30

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…It was found that SVM using radial basis function (RBF) kernel achieved the highest performance with an accuracy of 99.5%. …”
    Get full text
    article
  11. 31
  12. 32

    Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation by Raveendra Pilli (21633287)

    Published 2024
    “…Features from MRI images are extracted using 3-D-CNN and fed into the wavelet KRR-RVFL network for brain age classification and prediction. The proposed algorithm achieved high classification accuracy, 97.22%, 99.31%, and 95.83% for GM, WM, and CSF regions, respectively. …”
  13. 33
  14. 34

    On Optimizing Backoff Procedure to Enhance Throughput and Fairness For Wireless LANs by Al-Akeel, A.A.Mahmoud

    Published 2006
    “…Evaluation results indicate that better throughput and delay figures are obtained using the proposed algorithm. In addition the algorithm also achieves good fairness compared to DCF.…”
    Get full text
    Get full text
    article
  15. 35
  16. 36
  17. 37
  18. 38

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability by Abd-El-barr, Mostafa

    Published 2003
    “…A fault tolerant network is able to function even in the presence of some faults in the network. …”
    Get full text
    article
  19. 39
  20. 40