بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
-
481
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
منشور في 2024"…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …"
-
482
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
منشور في 2020احصل على النص الكامل
doctoralThesis -
483
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
منشور في 2023احصل على النص الكامل
doctoralThesis -
484
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
منشور في 2024"…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …"
-
485
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"