Search alternatives:
processing detection » protein detection (Expand Search), phishing detection (Expand Search)
based optimization » whale optimization (Expand Search)
data processing » image processing (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
binary base » binary mask (Expand Search), ciliary base (Expand Search), binary image (Expand Search)
base based » case based (Expand Search), blame based (Expand Search), made based (Expand Search)
processing detection » protein detection (Expand Search), phishing detection (Expand Search)
based optimization » whale optimization (Expand Search)
data processing » image processing (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
binary base » binary mask (Expand Search), ciliary base (Expand Search), binary image (Expand Search)
base based » case based (Expand Search), blame based (Expand Search), made based (Expand Search)
-
141
The RFD’s behavior mechanism (2002).
Published 2025“…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
-
142
-
143
An Example of a WPT-MEC Network.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
144
Related Work Summary.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
145
Simulation parameters.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
146
Training losses for N = 10.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
147
Normalized computation rate for N = 10.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
148
Summary of Notations Used in this paper.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
149
Results of the model on test sets 1 and 2.
Published 2023“…The high performance of the algorithm at both centers shows that the calibration process is efficient. …”
-
150
Scanners and staining methods.
Published 2023“…The high performance of the algorithm at both centers shows that the calibration process is efficient. …”
-
151
Design and implementation of the Multiple Criteria Decision Making (MCDM) algorithm for predicting the severity of COVID-19.
Published 2021“…<p>(A). The MCDM algorithm-Stage 1. Preprocessing, this stage is the process of refining the collected raw data to eliminate noise, including correlation analysis and feature selection based on P values. …”
-
152
Predictive Analysis of Mushroom Toxicity Based Exclusively on Their Natural Habitat.
Published 2025“…Model evaluation was based on accuracy metrics and qualitative analysis of the confusion matrix.. …”
-
153
-
154
-
155
Triplet Matching for Estimating Causal Effects With Three Treatment Arms: A Comparative Study of Mortality by Trauma Center Level
Published 2021“…Our algorithm outperforms the nearest neighbor algorithm and is shown to produce matched samples with total distance no larger than twice the optimal distance. …”
-
156
Data_Sheet_1_Multiclass Classification Based on Combined Motor Imageries.pdf
Published 2020“…And we propose two new multilabel uses of the Common Spatial Pattern (CSP) algorithm to optimize the signal-to-noise ratio, namely MC2CMI and MC2SMI approaches. …”
-
157
-
158
-
159
Related studies on IDS using deep learning.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
160
The architecture of the BI-LSTM model.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”