بدائل البحث:
utilization algorithm » initialization algorithm (توسيع البحث), optimization algorithms (توسيع البحث), maximization algorithm (توسيع البحث)
guided optimization » based optimization (توسيع البحث), model optimization (توسيع البحث)
source utilization » resource utilization (توسيع البحث), resource utilisation (توسيع البحث), service utilization (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
utilization algorithm » initialization algorithm (توسيع البحث), optimization algorithms (توسيع البحث), maximization algorithm (توسيع البحث)
guided optimization » based optimization (توسيع البحث), model optimization (توسيع البحث)
source utilization » resource utilization (توسيع البحث), resource utilisation (توسيع البحث), service utilization (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
-
1
The Pseudo-Code of the IRBMO Algorithm.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
2
IRBMO vs. meta-heuristic algorithms boxplot.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
3
IRBMO vs. feature selection algorithm boxplot.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
4
IRBMO vs. variant comparison adaptation data.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
5
-
6
-
7
Pseudo Code of RBMO.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
8
P-value on CEC-2017(Dim = 30).
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
9
Memory storage behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
10
Elite search behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
11
Description of the datasets.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
12
S and V shaped transfer functions.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
13
S- and V-Type transfer function diagrams.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
14
Collaborative hunting behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
15
Friedman average rank sum test results.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
16
Dataflow programming for the analysis of molecular dynamics with AViS, an analysis and visualization software application
منشور في 2020"…To overcome this problem, we designed a software application called AViS which focuses on the extensibility of analysis. By utilizing the dataflow programming (DFP) paradigm, algorithms can be defined by execution graphs, and arbitrary data can be transferred between nodes using visual connectors. …"
-
17
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
منشور في 2025"…The performance of the proposed LEGAN-BEPO-BCMANET technique attains 29.786%, 19.25%, 22.93%, 27.21%, 31.02%, 26.91%, and 25.61% greater throughput, compared to existing methods like Blockchain-based BATMAN protocol utilizing MANET with an ensemble algorithm (BATMAN-MANET), Block chain-based trusted distributed routing scheme with optimized dropout ensemble extreme learning neural network in MANET (DEELNN-MANET), A secured trusted routing utilizing structure of a new directed acyclic graph-blockchain in MANET internet of things environment (DAG-MANET), An Optimized Link State Routing Protocol with Blockchain Framework for Efficient Video-Packet Transmission and Security over MANET (OLSRP-MANET), Auto-metric Graph Neural Network based Blockchain Technology for Protected Dynamic Optimum Routing in MANET (AGNN-MANET) and Data security-based routing in MANETs under key management process (DSR-MANET) respectively.…"
-
18
Models and Dataset
منشور في 2025"…Operating in a binary search space, TJO simulates intelligent and evasive movements of the prey to guide the population toward optimal solutions. …"
-
19
PathOlOgics_RBCs Python Scripts.zip
منشور في 2023"…<p dir="ltr">The first algorithm for segmentation and localization (see PathOlOgics_script_1; segment & localize using a pen) relied on manually tracing the borders of each cell using a digital pen tool on a big touchscreen display showing source images/patches. …"
-
20
Equivalent Mutants Analysed via Deductive Verification
منشور في 2025"…We therefore added three search algorithms: BinarySearch, FindLast and FindMin.</p>…"