Showing results 13 to 21 of 21
< previous
Issue Date | Title | Author(s) |
10-May-2017 | Hybrid whale optimization algorithm with simulated annealing for feature selection | Mafarja, Majdi; Mirjalili, Seyedali |
2022 | The Intrusion Detection System by Deep Learning Methods: Issues and Challenges | Surakhi, Ola ; GarcĂa, Antonio ; Jamoos, Mohammed ; Alkhanafseh, Mohammad |
2022 | Investigation Framework for Cloud Forensics using Dynamic Genetic-based Clustering | Alkhanafseh, Mohammed Y. ; Qatawneh, Mohammad ; Almobaideen, Wesam |
2013 | On parameter tuning in search-based software engineering: a replicated empirical study | Sayyad, Abdel Salam; Goseva-Popstojanova, Katerina; Menzies, Tim; Ammar, Hany |
2005 | On the effectiveness and efficiency of computing bounds on the support of item-sets in the frequent item-sets mining problem | Sayrafi, Bassem; Van Gucht, Dirk; Purdom, Paul W. |
2013 | Optimum feature selection in software product lines: let your model and values guide your search | Sayyad, Abdel Salam; Ingram, Joseph; Menzies, Tim; Ammar, Hany |
19-Jul-2017 | S-shaped vs. V-shaped transfer functions for ant lion optimization algorithm in feature selection problem | Mafarja, Majdi; Eleyan, Derar; Abdullah, Salwani; Mirjalili, Seyedali |
2013 | Scalable product line configuration: A straw to break the camel's back | Sayyad, Abdel Salam; Ingram, Joseph; Menzies, Tim; Ammar, Hany |
16-Dec-2017 | Tag Ranking Multi-agent Semantic Social Networks | Awad, Sameh; Hamamreh, Rushdi |