بدائل البحث:
mining algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
641
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …"
-
642
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
منشور في 2024"…The use of AI in ECG analysis has several benefits, including the quick and precise detection of problems like arrhythmias, silent cardiac illnesses, and left ventricular failure. …"
-
643
A decentralized load balancing approach for parallel search-tree optimization
منشور في 2017"…As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
644
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
645
Experimental evaluation of multi-agent reinforcement learning in real-world scale-free networks
منشور في 2010"…However, the study and analysis of the state-of-the-art multi-agent reinforcement learning (MARL) algorithms have been limited to small problems involving few number of learning agents.The purpose of this project is to conduct an extensive evaluation and comparison of MARL algorithms when used in networks that exhibit the scale-free property. …"
احصل على النص الكامل
-
646
-
647
Systematic reviews in sentiment analysis: a tertiary study
منشور في 2022"…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …"
-
648
Precision nutrition: A systematic literature review
منشور في 2021"…Four machine learning tasks are seen in the form of regression, classification, recommendation and clustering, with most of these utilizing a supervised approach. In total, 30 algorithms were used, with 19 appearing more than once. …"
-
649
Central schemes for ideal magnetohydrodynamics
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
650
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
منشور في 2025"…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …"
-
651
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
652
An aspect-oriented framework for systematic security hardening of software
منشور في 2008"…In this thesis, we address the problems related to the security hardening of open source software. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
653
-
654
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
-
655
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
656
A new method for broad‐scale modeling and projection of plant assemblages under climatic, biotic, and environmental cofiltering
منشور في 2023"…To this purpose, we first used multilabel algorithms in order to convert the task of explaining a large assemblage of plant communities into a classification framework able to capture with high cross-validated accuracy the pattern of species distributions under a composite set of biotic and abiotic factors. …"