بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
641
Localizing-ground Transmitters Using Airborne Antenna Array
منشور في 2020احصل على النص الكامل
doctoralThesis -
642
Precision nutrition: A systematic literature review
منشور في 2021"…Four machine learning tasks are seen in the form of regression, classification, recommendation and clustering, with most of these utilizing a supervised approach. In total, 30 algorithms were used, with 19 appearing more than once. …"
-
643
Central schemes for ideal magnetohydrodynamics
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
644
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
منشور في 2025"…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …"
-
645
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
646
An aspect-oriented framework for systematic security hardening of software
منشور في 2008"…In this thesis, we address the problems related to the security hardening of open source software. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
647
-
648
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
-
649
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
650
A new method for broad‐scale modeling and projection of plant assemblages under climatic, biotic, and environmental cofiltering
منشور في 2023"…To this purpose, we first used multilabel algorithms in order to convert the task of explaining a large assemblage of plant communities into a classification framework able to capture with high cross-validated accuracy the pattern of species distributions under a composite set of biotic and abiotic factors. …"