يعرض 1 - 20 نتائج من 23 نتيجة بحث عن '(( binary data guided optimization algorithm ) OR ( binary _ source utilization algorithm ))', وقت الاستعلام: 0.37s تنقيح النتائج
  1. 1

    The Pseudo-Code of the IRBMO Algorithm. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  2. 2

    IRBMO vs. meta-heuristic algorithms boxplot. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  3. 3

    IRBMO vs. feature selection algorithm boxplot. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  4. 4

    IRBMO vs. variant comparison adaptation data. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  5. 5
  6. 6
  7. 7

    Pseudo Code of RBMO. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  8. 8

    P-value on CEC-2017(Dim = 30). حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  9. 9

    Memory storage behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  10. 10

    Elite search behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  11. 11

    Description of the datasets. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  12. 12

    S and V shaped transfer functions. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  13. 13

    S- and V-Type transfer function diagrams. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  14. 14

    Collaborative hunting behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  15. 15

    Friedman average rank sum test results. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  16. 16

    Dataflow programming for the analysis of molecular dynamics with AViS, an analysis and visualization software application حسب Kai Pua (8741547)

    منشور في 2020
    "…To overcome this problem, we designed a software application called AViS which focuses on the extensibility of analysis. By utilizing the dataflow programming (DFP) paradigm, algorithms can be defined by execution graphs, and arbitrary data can be transferred between nodes using visual connectors. …"
  17. 17

    Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization حسب Sandeep Jagonda Patil (22048337)

    منشور في 2025
    "…The performance of the proposed LEGAN-BEPO-BCMANET technique attains 29.786%, 19.25%, 22.93%, 27.21%, 31.02%, 26.91%, and 25.61% greater throughput, compared to existing methods like Blockchain-based BATMAN protocol utilizing MANET with an ensemble algorithm (BATMAN-MANET), Block chain-based trusted distributed routing scheme with optimized dropout ensemble extreme learning neural network in MANET (DEELNN-MANET), A secured trusted routing utilizing structure of a new directed acyclic graph-blockchain in MANET internet of things environment (DAG-MANET), An Optimized Link State Routing Protocol with Blockchain Framework for Efficient Video-Packet Transmission and Security over MANET (OLSRP-MANET), Auto-metric Graph Neural Network based Blockchain Technology for Protected Dynamic Optimum Routing in MANET (AGNN-MANET) and Data security-based routing in MANETs under key management process (DSR-MANET) respectively.…"
  18. 18

    Models and Dataset حسب M RN (9866504)

    منشور في 2025
    "…Operating in a binary search space, TJO simulates intelligent and evasive movements of the prey to guide the population toward optimal solutions. …"
  19. 19

    PathOlOgics_RBCs Python Scripts.zip حسب Ahmed Elsafty (16943883)

    منشور في 2023
    "…<p dir="ltr">The first algorithm for segmentation and localization (see PathOlOgics_script_1; segment & localize using a pen) relied on manually tracing the borders of each cell using a digital pen tool on a big touchscreen display showing source images/patches. …"
  20. 20

    Equivalent Mutants Analysed via Deductive Verification حسب Serge Demeyer (5133878)

    منشور في 2025
    "…We therefore added three search algorithms: BinarySearch, FindLast and FindMin.</p>…"