بدائل البحث:
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm a (توسيع البحث)
algorithm goa » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث), algorithms a (توسيع البحث)
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm a (توسيع البحث)
algorithm goa » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث), algorithms a (توسيع البحث)
-
21
A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation
منشور في 2021"…The role of the proposed quasi oppositional based SMPID controller is to modify the tracking strategy on AC/HVDC interconnected systems while reducing the related cost function. The proposed analysis is established considering the most highly cited, well-known tested and newly expanded swarm-based optimization algorithms (SBOAs), such as Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimization (GWO), Artificial Fish Swarm Algorithm (AFSA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). …"
-
22
Ensemble Deep Random Vector Functional Link Neural Network for Regression
منشور في 2022"…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …"
-
23
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
-
24
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…An intrusion detection system (IDS) is the most promising solution for preventing malicious intrusions and tracing suspicious network behavioral patterns. Machine learning (ML) methods are widely used in IDS. …"
-
25
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
منشور في 2021"…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …"
-
26
Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence
منشور في 2020"…Moreover, majority of improvements made by the researchers in optimization techniques have focused on the accuracy of solution and have overlooked the convergence speed of an algorithm. Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …"
-
27
Computational evluation of protein energy functions
منشور في 2014"…A protein is characterized by its 3D structure, which defines its biological function. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
28
Iterative Least Squares Functional Networks Classifier
منشور في 2007"…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …"
احصل على النص الكامل
احصل على النص الكامل
article -
29
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
30
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
31
Boosting the visibility of services in microservice architecture
منشور في 2023"…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"
-
32
Evolutionary algorithm for protein structure prediction
منشور في 2010"…A protein is characterized by its 3D structure, which defines its biological function. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
33
Machine Learning Model for a Sustainable Drilling Process
منشور في 2023احصل على النص الكامل
doctoralThesis -
34
-
35
-
36
Distributed dimension reduction algorithms for widely dispersed data
منشور في 2002"…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
37
-
38
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …"
-
39
-
40
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis