Search Results - (( java optimization modified algorithm ) OR ( peer equation using algorithm ))
Search alternatives:
- optimization modified »
- java optimization »
- using algorithm »
- equation using »
- peer equation »
-
1
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
-
7
Algorithm solution for space-fractional diffusion equations
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A new algorithm for system of integral equations
Published 2014Get full text
Get full text
Get full text
Article -
10
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017Get full text
Get full text
Get full text
Book Chapter -
11
-
12
-
13
Assessing the simulation performances of multiple model selection algorithm
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Guidance, navigation and control for satellite proximity operations using Tschauner-Hempel equations
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
Parallel method using MPI for solving large systems of delay differential equations
Published 2012Get full text
Get full text
Conference or Workshop Item -
17
-
18
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
19
-
20
A new stepsize for gradient method via weak secant equation
Published 2007Get full text
Conference or Workshop Item
