بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
mould » could (توسيع البحث), would (توسيع البحث), mold (توسيع البحث)
defined » designed (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
mould » could (توسيع البحث), would (توسيع البحث), mold (توسيع البحث)
defined » designed (توسيع البحث)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…The slime mould algorithm (SMA) gives good results in finding the best solutions to optimization problems. …"
احصل على النص الكامل
-
2
-
3
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
4
-
5
-
6
Topics in graph algorithms
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
7
BUC algorithm for iceberg cubes
منشور في 2003"…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
-
9
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
10
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
منشور في 2024"…Environment and conditions are assumed to be similar in future drone flights within the radars’ defined zone. The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …"
احصل على النص الكامل
-
11
Evolutionary algorithm for protein structure prediction
منشور في 2010احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
A direct algorithm for the parameterized face cover problem
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
13
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
منشور في 2016احصل على النص الكامل
doctoralThesis -
14
-
15
A New Penalty Function Algorithm For Convex Quadratic Programming
منشور في 2020"…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
احصل على النص الكامل
article -
16
-
17
Leveraging Machine and Deep Learning Algorithms for hERG Blocker Prediction
منشور في 2025"…While the threshold for blockers is defined as ≤10 μ M and for non-blockers, it is >10 μ M, our analysis indicates that a threshold of 60- 80 μ M provides a more accurate cut-off for non-blockers. …"
-
18
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
19
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
منشور في 2022"…In literature, to improve security at the network layer of the IoT architecture, the possibility of using Software-Defined Networking (SDN) was explored. …"
-
20
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
منشور في 2023"…The primary objective of load balancing is to map workloads to use computing resources that significantly improve performance. …"