Showing 41 - 60 results of 186 for search '(( primary data node initialization algorithm ) OR ( genes based process optimization algorithm ))', query time: 1.11s Refine Results
  1. 41
  2. 42

    Architecture of proposed system model. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  3. 43

    Network simulation of the proposed method. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  4. 44

    Simulation parameters of SDN network. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  5. 45

    Generator loss of the proposed method. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  6. 46

    Simulation parameters of DDcGAN. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  7. 47

    Performance metrics. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  8. 48

    Flow diagram for the proposed methodology. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  9. 49

    Discriminator loss of suggested technique. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  10. 50

    System model of the proposed method. by Nanavath Kiran Singh Nayak (22184565)

    Published 2025
    “…Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. …”
  11. 51
  12. 52

    GSE96058 information. by Sepideh Zununi Vahed (9861298)

    Published 2024
    “…Subsequently, feature selection was conducted using ANOVA and binary Particle Swarm Optimization (PSO). During the analysis phase, the discriminative power of the selected features was evaluated using machine learning classification algorithms. …”
  13. 53

    The performance of classifiers. by Sepideh Zununi Vahed (9861298)

    Published 2024
    “…Subsequently, feature selection was conducted using ANOVA and binary Particle Swarm Optimization (PSO). During the analysis phase, the discriminative power of the selected features was evaluated using machine learning classification algorithms. …”
  14. 54
  15. 55
  16. 56
  17. 57

    Optimized combination methods for exploring novel space environment-responsive genes and their roles: insights from space-flown <i>C. elegans</i> and their implications for astrona... by Zejun Li (176523)

    Published 2025
    “…</p> <p>We employed an optimized combination algorithm that integrated two co-expression network analysis methods and four machine learning-based models to identify space environment-responsive genes (SEGs) in space-flown <i>C. elegans</i>. …”
  18. 58
  19. 59
  20. 60