يعرض 121 - 140 نتائج من 214 نتيجة بحث عن '(((( complex system algorithm ) OR ( elements study algorithm ))) OR ( neural coding algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 121

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…Therefore, the proposed work aims to develop a Decentralized Identifiable Distributed Ledger Technology‐Blockchain (DIDLT‐BC) framework that is intelligent and effective, requiring the least amount of computing complexity to ensure cloud IoT system safety. In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …"
  2. 122

    A hybrid Harris Hawks optimizer for economic load dispatch problems حسب Al-Betar, Mohammed Azmi

    منشور في 2022
    "…ELD is an important problem in power systems that is tackled by finding the optimal schedule of the generation units that minimize fuel conceptions under a set of constraints. …"
    احصل على النص الكامل
  3. 123

    Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…However, maintaining high operational stability is increasingly challenging due to evolving grid complexities and potential adversarial threats. This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …"
  4. 124
  5. 125

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach حسب Nagendra Prabhu Selvaraj (17542041)

    منشور في 2022
    "…Further, back-off features are extracted from the particular node and all these structures are trained and categorized with a Co-Active Neuro Fuzzy Expert System (CANFES) classifier. The performance of the proposed bot detection system in the internet environment is analyzed latency, detection rate, packet delivery ration, energy availability and precision.…"
  6. 126
  7. 127

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…Procurement is an extensive and complex sector in the manufacturing industry, and has attracted an extensive and wide-spreading fraud that directly impacts the operation of an organization and economy at large. …"
    احصل على النص الكامل
  8. 128

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring حسب Muzna Yumman (16494023)

    منشور في 2020
    "…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
  9. 129

    Adaptive temperature control of a reverse flow process by using reinforcement learning approach حسب A. Binid (22046054)

    منشور في 2024
    "…It should be mentioned that this approach is not reliant on the internal dynamics of the CFRR system, which is a complex process and is most effectively modeled using Partial Differential Equations (PDEs). …"
  10. 130
  11. 131

    ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints حسب Mohammed Al Disi (16855407)

    منشور في 2018
    "…However, it is usually associated with computational complexity at the decoding end, increasing the latency of the system. …"
  12. 132

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…<p>The energy internet (EI) is evolving toward decentralized, data-rich, and time-critical operation, where legacy optimization often fails to meet complexity, scalability, and real-time constraints. …"
  13. 133
  14. 134

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…However, it limits the critical problems of high time complexity, computational cost, difficulty to understand, and reduced level of security. …"
  15. 135
  16. 136
  17. 137
  18. 138
  19. 139

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. …"
  20. 140

    Reinforcement Learning for Resilient Aerial-IRS Assisted Wireless Communications Networks in the Presence of Multiple Jammers حسب Zain Ul Abideen Tariq (17984107)

    منشور في 2024
    "…<p dir="ltr">The evolving landscape of beyond 5G and 6G wireless communication systems in smart urban environments faces numerous interference-related challenges posed by legitimate and illicit devices. …"