Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Supervised feature selection techniques in network intrusion detection: A critical review
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
Bayesian model selection for group studies
Bayesian model selection (BMS) is a powerful method for determining the most likely among
a set of competing hypotheses about the mechanisms that generated observed data. BMS …
a set of competing hypotheses about the mechanisms that generated observed data. BMS …
[BOK][B] Applied integer programming: modeling and solution
DS Chen, RG Batson, Y Dang - 2011 - books.google.com
An accessible treatment of the modeling and solution of integer programming problems,
featuring modern applications and software In order to fully comprehend the algorithms …
featuring modern applications and software In order to fully comprehend the algorithms …
[BOK][B] Handbook of approximation algorithms and metaheuristics
TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
Tabu search
M Gendreau, JY Potvin - … introductory tutorials in optimization and decision …, 2005 - Springer
Over the last 15 years, hundreds of papers presenting applications of tabu search, a
heuristic method originally proposed by (1986), to various combinatorial problems have …
heuristic method originally proposed by (1986), to various combinatorial problems have …
[BOK][B] Introduction to computational optimization models for production planning in a supply chain
S Voß, DL Woodruff - 2006 - books.google.com
provide models that could be used by do-it-yourselfers and also can be used toprovideunderstandingofthebackgroundiss…
job of working with the (proprietary) algorithms of the software vendors. In this book we …
job of working with the (proprietary) algorithms of the software vendors. In this book we …
Tabu search for attribute reduction in rough set theory
AR Hedar, J Wang, M Fukushima - Soft Computing, 2008 - Springer
In this paper, we consider a memory-based heuristic of tabu search to solve the attribute
reduction problem in rough set theory. The proposed method, called tabu search attribute …
reduction problem in rough set theory. The proposed method, called tabu search attribute …
A survey on evolutionary algorithms dynamics and its complexity–Mutual relations, past, present and future
I Zelinka - Swarm and Evolutionary Computation, 2015 - Elsevier
Swarm and evolutionary based algorithms represent a class of search methods that can be
used for solving optimization problems. They mimic natural principles of evolution and …
used for solving optimization problems. They mimic natural principles of evolution and …
Hybrid immune-genetic algorithm method for benefit maximisation of distribution network operators and distributed generation owners in a deregulated environment
In deregulated power systems, distribution network operators (DNO) are responsible for
maintaining the proper operation and efficiency of distribution networks. This is achieved …
maintaining the proper operation and efficiency of distribution networks. This is achieved …
Rough set and scatter search metaheuristic based feature selection for credit scoring
J Wang, AR Hedar, S Wang, J Ma - Expert Systems with Applications, 2012 - Elsevier
As the credit industry has been growing rapidly, credit scoring models have been widely
used by the financial industry during this time to improve cash flow and credit collections …
used by the financial industry during this time to improve cash flow and credit collections …