بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 341 - 360 نتائج من 1,059 نتيجة بحث عن '(( element network algorithm ) OR ((( data using algorithm ) OR ( problem using algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 341

    Evolutionary algorithms for VLSI multi-objective netlist partitioning حسب Sait, Sadiq M.

    منشور في 2006
    "…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …"
    احصل على النص الكامل
    article
  2. 342
  3. 343
  4. 344
  5. 345

    Convergence behavior of the normalized least mean fourth algorithm حسب Zerguine, A.

    منشور في 2000
    "…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 346

    Evolutionary algorithm for predicting all-atom protein structure حسب Mansour, Nashat

    منشور في 2011
    "…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 347

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  8. 348

    A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems حسب Raka Jovanovic (17947838)

    منشور في 2021
    "…The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …"
  9. 349
  10. 350
  11. 351

    A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS حسب Zerguine, Azzedine

    منشور في 2020
    "…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …"
    احصل على النص الكامل
    article
  12. 352

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers حسب Tarhini, Abbas

    منشور في 2020
    "…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 353

    Metaheuristic Optimization Algorithms for Training Artificial Neural Networks حسب Mansour, Nashat

    منشور في 2012
    "…The Cuckoo Search (CS) algorithm is a recently developed meta-heuristic optimization algorithm which is suitable for solving optimization problems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 354
  15. 355
  16. 356

    Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices حسب Aya Hasan Alkhereibi (17151070)

    منشور في 2025
    "…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …"
  17. 357

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture حسب Moutaz Alazab (17730060)

    منشور في 2025
    "…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
  18. 358

    Data redundancy management for leaf-edges in connected environments حسب Mansour, Elio

    منشور في 2022
    "…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 359
  20. 360