Showing 61 - 80 results of 631 for search '(( binary time process optimisation algorithm ) OR ( less based based optimization algorithm ))', query time: 0.49s Refine Results
  1. 61
  2. 62

    Demonstration of algorithm convergence. by Quyuan Wang (8724972)

    Published 2025
    “…To maintain dynamic market equilibrium, we develop two types of pricing algorithms, one based on stepped price adjustments for selected sellers, and another based on smoothed adjustments for all sellers. …”
  3. 63

    The relaxed gradient based iterative algorithm for solving the generalized coupled complex conjugate and transpose Sylvester matrix equations by Yanping Long (10171727)

    Published 2024
    “…(Journal of the Franklin Institute, 2018), we adopt relaxation technique and introduce relaxation factors into the gradient based iterative (GI) algorithm, and the relaxed based iterative (RGI) algorithm is established to solve the generalized coupled complex conjugate and transpose Sylvester matrix equations. …”
  4. 64
  5. 65

    APL, ACC and ACC /APL of the optimal benchmark networks with different mixing parameter. by Ruochen Zhang (3434996)

    Published 2024
    Subjects: “…multiobjective evolutionary algorithm…”
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78

    Table_1_Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning.DOCX by Maruf A. Tamal (18947776)

    Published 2024
    “…Subsequently, data cleansing, curation, and dimensionality reduction were performed to remove outliers, handle missing values, and exclude less predictive features. To identify the optimal model, the study evaluated and compared 15 SML algorithms arising from different machine learning (ML) families, including Bayesian, nearest-neighbors, decision trees, neural networks, quadratic discriminant analysis, logistic regression, bagging, boosting, random forests, and ensembles. …”
  19. 79

    Table_2_Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning.DOCX by Maruf A. Tamal (18947776)

    Published 2024
    “…Subsequently, data cleansing, curation, and dimensionality reduction were performed to remove outliers, handle missing values, and exclude less predictive features. To identify the optimal model, the study evaluated and compared 15 SML algorithms arising from different machine learning (ML) families, including Bayesian, nearest-neighbors, decision trees, neural networks, quadratic discriminant analysis, logistic regression, bagging, boosting, random forests, and ensembles. …”
  20. 80