بدائل البحث:
robust optimization » process optimization (توسيع البحث), robust estimation (توسيع البحث), joint optimization (توسيع البحث)
used optimization » based optimization (توسيع البحث), led optimization (توسيع البحث), guided optimization (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
robust optimization » process optimization (توسيع البحث), robust estimation (توسيع البحث), joint optimization (توسيع البحث)
used optimization » based optimization (توسيع البحث), led optimization (توسيع البحث), guided optimization (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
-
1
-
2
-
3
The Pseudo-Code of the IRBMO Algorithm.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
4
IRBMO vs. meta-heuristic algorithms boxplot.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
5
IRBMO vs. feature selection algorithm boxplot.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
6
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
منشور في 2025"…To tackle these challenges, this paper proposes the Blockchain Based Trusted Distributed Routing Scheme for MANET using Latent Encoder Coupled Generative Adversarial Network Optimized with Binary Emperor Penguin Optimizer (LEGAN-BEPO-BCMANET). …"
-
7
-
8
-
9
-
10
-
11
-
12
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
منشور في 2025"…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …"
-
13
IRBMO vs. variant comparison adaptation data.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
14
Pseudo Code of RBMO.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
15
P-value on CEC-2017(Dim = 30).
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
16
Memory storage behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
17
Elite search behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
18
Description of the datasets.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
19
S and V shaped transfer functions.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
20
S- and V-Type transfer function diagrams.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"