بدائل البحث:
processing optimization » process optimization (توسيع البحث), process optimisation (توسيع البحث), routing optimization (توسيع البحث)
model optimization » codon optimization (توسيع البحث), global optimization (توسيع البحث), based optimization (توسيع البحث)
data processing » image processing (توسيع البحث)
binary task » binary mask (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
task model » risk model (توسيع البحث)
processing optimization » process optimization (توسيع البحث), process optimisation (توسيع البحث), routing optimization (توسيع البحث)
model optimization » codon optimization (توسيع البحث), global optimization (توسيع البحث), based optimization (توسيع البحث)
data processing » image processing (توسيع البحث)
binary task » binary mask (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
task model » risk model (توسيع البحث)
-
61
-
62
-
63
-
64
Small-scale dataset comparative analysis using the number of features selected.
منشور في 2023الموضوعات: -
65
-
66
-
67
-
68
-
69
-
70
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
منشور في 2025"…The performance of the proposed LEGAN-BEPO-BCMANET technique attains 29.786%, 19.25%, 22.93%, 27.21%, 31.02%, 26.91%, and 25.61% greater throughput, compared to existing methods like Blockchain-based BATMAN protocol utilizing MANET with an ensemble algorithm (BATMAN-MANET), Block chain-based trusted distributed routing scheme with optimized dropout ensemble extreme learning neural network in MANET (DEELNN-MANET), A secured trusted routing utilizing structure of a new directed acyclic graph-blockchain in MANET internet of things environment (DAG-MANET), An Optimized Link State Routing Protocol with Blockchain Framework for Efficient Video-Packet Transmission and Security over MANET (OLSRP-MANET), Auto-metric Graph Neural Network based Blockchain Technology for Protected Dynamic Optimum Routing in MANET (AGNN-MANET) and Data security-based routing in MANETs under key management process (DSR-MANET) respectively.…"
-
71
A* Path-Finding Algorithm to Determine Cell Connections
منشور في 2025"…</p><p dir="ltr">Astrocytes were dissociated from E18 mouse cortical tissue, and image data were processed using a Cellpose 2.0 model to mask nuclei. …"
-
72
-
73
-
74
Dynamic resource allocation process.
منشور في 2025"…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …"
-
75
-
76
Thesis-RAMIS-Figs_Slides
منشور في 2024"…<pre>Figures at Thesis_RAMIS/Figs_PI related with PhD Thesis:<br><br>AN INFORMATION-THEORETIC SAMPLING STRATEGY FOR THE RECOVERY OF GEOLOGICAL IMAGES: MODELING, ANALYSIS, AND IMPLEMENTATION<br><br>Data for the <a href="https://github.com/fsantibanezleal/FASL_Thesis_RAMIS" rel="noreferrer" target="_blank">LaTeX </a>version of the document<br><br>In this thesis the role of preferential sampling has been systematically addressed for the task of geological facies recovery using multiple-point simulation (\emph{<i>MPS</i>}) and for the problem of short-term planning in mining. …"
-
77
Pseudo Code of RBMO.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
78
P-value on CEC-2017(Dim = 30).
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
79
Memory storage behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
80
Elite search behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"