bizarre 发表于 2025-3-27 00:50:52

http://reply.papertrans.cn/25/2418/241758/241758_31.png

合同 发表于 2025-3-27 01:29:52

Chemical Reaction Optimization for Solving Resource Constrained Project Scheduling Problemduling problem (RCPSP). This work employed chemical reaction optimization to schedule project tasks to minimize makespan concerning resource and precedence constraints. Chemical reaction optimization is a population-based metaheuristic algorithm. CRO is applied to RCPSP by redesigning its basic oper

流逝 发表于 2025-3-27 05:21:07

A Modified Particle Swarm Optimization for Autonomous UAV Path Planning in 3D Environmentistic algorithms proved to be a better choice in recent years. Particle Swarm Optimization (PSO) is one of the widely applied meta-heuristic algorithms for non-deterministic problem due to simplicity and ease of implementation. However, the lack of diversity in the particles in PSO algorithm generat

好忠告人 发表于 2025-3-27 09:37:45

http://reply.papertrans.cn/25/2418/241758/241758_34.png

符合你规定 发表于 2025-3-27 17:08:49

http://reply.papertrans.cn/25/2418/241758/241758_35.png

为宠爱 发表于 2025-3-27 19:27:11

https://doi.org/10.1007/978-1-4757-0354-2n tested on large benchmark instances and compared with other metaheuristic algorithms. The experimental results have shown that our proposed method provides better results than other states of art algorithms in terms of both the qualities of result and execution time.

撕裂皮肉 发表于 2025-3-28 00:22:23

Performance Optimization of Layered Signature Based Intrusion Detection System Using Snortem of signature. A layered database system has been proposed to upgrade system performance. An analytical operation has been conveyed on the proposed solution and compared with the existing standard system. After applying the proposed solution the number of packets analyzed rate has been increasing remarkably from 86% to 98%.

MAL 发表于 2025-3-28 05:57:53

http://reply.papertrans.cn/25/2418/241758/241758_38.png

Frequency-Range 发表于 2025-3-28 09:44:39

1867-8211 , ICONCS 2020, held in Dhaka, Bangladesh, in February 2020. . The 58 full papers were carefully reviewed and selected from 133 submissions.. The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems

cutlery 发表于 2025-3-28 10:32:00

Conference proceedings 2020h care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Cyber Security and Computer Science; Second EAI Internati Touhid Bhuiyan,Md. Mostafijur Rahman,Md. Asraf Ali Conference proceedings 2020 IC