Search alternatives:
process optimization » model optimization (Expand Search)
based optimization » whale optimization (Expand Search)
binary state » binary image (Expand Search), binary data (Expand Search)
state based » rate based (Expand Search), scale based (Expand Search)
process optimization » model optimization (Expand Search)
based optimization » whale optimization (Expand Search)
binary state » binary image (Expand Search), binary data (Expand Search)
state based » rate based (Expand Search), scale based (Expand Search)
-
1
-
2
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
Published 2025“…The performance of the proposed LEGAN-BEPO-BCMANET technique attains 29.786%, 19.25%, 22.93%, 27.21%, 31.02%, 26.91%, and 25.61% greater throughput, compared to existing methods like Blockchain-based BATMAN protocol utilizing MANET with an ensemble algorithm (BATMAN-MANET), Block chain-based trusted distributed routing scheme with optimized dropout ensemble extreme learning neural network in MANET (DEELNN-MANET), A secured trusted routing utilizing structure of a new directed acyclic graph-blockchain in MANET internet of things environment (DAG-MANET), An Optimized Link State Routing Protocol with Blockchain Framework for Efficient Video-Packet Transmission and Security over MANET (OLSRP-MANET), Auto-metric Graph Neural Network based Blockchain Technology for Protected Dynamic Optimum Routing in MANET (AGNN-MANET) and Data security-based routing in MANETs under key management process (DSR-MANET) respectively.…”
-
3
Analysis and design of algorithms for the manufacturing process of integrated circuits
Published 2023“…The (approximate) solution proposals of state-of-the-art methods include rule-based approaches, genetic algorithms, and reinforcement learning. …”
-
4
-
5
Machine Learning-Ready Dataset for Cytotoxicity Prediction of Metal Oxide Nanoparticles
Published 2025“…Details on the data sourcing process, prompt engineering strategies for large language model (LLM)-based extraction, and validation protocols are provided in the Supplementary Information section.…”