Search alternatives:
utilization algorithm » initialization algorithm (Expand Search), optimization algorithms (Expand Search), maximization algorithm (Expand Search)
resource utilization » resource allocation (Expand Search)
process optimization » model optimization (Expand Search)
data resource » data resources (Expand Search), data source (Expand Search), water resource (Expand Search)
data process » data processing (Expand Search), damage process (Expand Search), data access (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
utilization algorithm » initialization algorithm (Expand Search), optimization algorithms (Expand Search), maximization algorithm (Expand Search)
resource utilization » resource allocation (Expand Search)
process optimization » model optimization (Expand Search)
data resource » data resources (Expand Search), data source (Expand Search), water resource (Expand Search)
data process » data processing (Expand Search), damage process (Expand Search), data access (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
-
1
Dynamic resource allocation process.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
2
Event-driven data flow processing.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
3
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
4
-
5
-
6
Confusion matrix.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
7
Parameter settings.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
8
-
9
-
10
-
11
-
12
a) Accuracy and b) selected feature size of algorithms on the COVID-19 dataset.
Published 2022Subjects: -
13
-
14
Boxplots analysis of the tested algorithms using average error rate across 21 datasets.
Published 2022Subjects: -
15
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
Published 2025“…The performance of the proposed LEGAN-BEPO-BCMANET technique attains 29.786%, 19.25%, 22.93%, 27.21%, 31.02%, 26.91%, and 25.61% greater throughput, compared to existing methods like Blockchain-based BATMAN protocol utilizing MANET with an ensemble algorithm (BATMAN-MANET), Block chain-based trusted distributed routing scheme with optimized dropout ensemble extreme learning neural network in MANET (DEELNN-MANET), A secured trusted routing utilizing structure of a new directed acyclic graph-blockchain in MANET internet of things environment (DAG-MANET), An Optimized Link State Routing Protocol with Blockchain Framework for Efficient Video-Packet Transmission and Security over MANET (OLSRP-MANET), Auto-metric Graph Neural Network based Blockchain Technology for Protected Dynamic Optimum Routing in MANET (AGNN-MANET) and Data security-based routing in MANETs under key management process (DSR-MANET) respectively.…”
-
16
-
17
-
18
-
19
-
20