Showing 141 - 160 results of 246 for search '(( binary data processing detection algorithm ) OR ( binary base based optimization algorithm ))*', query time: 0.44s Refine Results
  1. 141

    The RFD’s behavior mechanism (2002). by Hossein Jarrahi (22530251)

    Published 2025
    “…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
  2. 142
  3. 143

    An Example of a WPT-MEC Network. by Hend Bayoumi (22693738)

    Published 2025
    “…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
  4. 144

    Related Work Summary. by Hend Bayoumi (22693738)

    Published 2025
    “…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
  5. 145

    Simulation parameters. by Hend Bayoumi (22693738)

    Published 2025
    “…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
  6. 146

    Training losses for N = 10. by Hend Bayoumi (22693738)

    Published 2025
    “…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
  7. 147

    Normalized computation rate for N = 10. by Hend Bayoumi (22693738)

    Published 2025
    “…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
  8. 148

    Summary of Notations Used in this paper. by Hend Bayoumi (22693738)

    Published 2025
    “…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
  9. 149

    Results of the model on test sets 1 and 2. by Rémy Peyret (14691736)

    Published 2023
    “…The high performance of the algorithm at both centers shows that the calibration process is efficient. …”
  10. 150

    Scanners and staining methods. by Rémy Peyret (14691736)

    Published 2023
    “…The high performance of the algorithm at both centers shows that the calibration process is efficient. …”
  11. 151

    Design and implementation of the Multiple Criteria Decision Making (MCDM) algorithm for predicting the severity of COVID-19. by Jiaqing Luo (10975030)

    Published 2021
    “…<p>(A). The MCDM algorithm-Stage 1. Preprocessing, this stage is the process of refining the collected raw data to eliminate noise, including correlation analysis and feature selection based on P values. …”
  12. 152

    Predictive Analysis of Mushroom Toxicity Based Exclusively on Their Natural Habitat. by Enrico Bertozzi (22461709)

    Published 2025
    “…Model evaluation was based on accuracy metrics and qualitative analysis of the confusion matrix.. …”
  13. 153
  14. 154
  15. 155

    Triplet Matching for Estimating Causal Effects With Three Treatment Arms: A Comparative Study of Mortality by Trauma Center Level by Giovanni Nattino (561797)

    Published 2021
    “…Our algorithm outperforms the nearest neighbor algorithm and is shown to produce matched samples with total distance no larger than twice the optimal distance. …”
  16. 156

    Data_Sheet_1_Multiclass Classification Based on Combined Motor Imageries.pdf by Cecilia Lindig-León (7889777)

    Published 2020
    “…And we propose two new multilabel uses of the Common Spatial Pattern (CSP) algorithm to optimize the signal-to-noise ratio, namely MC2CMI and MC2SMI approaches. …”
  17. 157
  18. 158
  19. 159

    Related studies on IDS using deep learning. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  20. 160

    The architecture of the BI-LSTM model. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”