بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
-
641
Various Faults Classification of Industrial Application of Induction Motors Using Supervised Machine Learning: A Comprehensive Review
منشور في 2025"…In current literature, there are a number of papers that address all these faults using different methods, and this paper compiles the information from the written works for ease of access. Machine learning algorithms are a set of data-driven rules that are able to classify specific faults in induction motors, which will be explained further in this review paper. …"
-
642
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
643
Robustness and Convergence of P-type Learning Control
منشور في 1993احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
644
-
645
-
646
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
منشور في 2009احصل على النص الكامل
doctoralThesis -
647
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
منشور في 2018"…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
-
648
Stability and Numerical Solutions of Second Wave Mathematical Modeling on COVID-19 and Omicron Outbreak Strategy of Pandemic: Analytical and Error Analysis of Approximate Series So...
منشور في 2022"…The algorithm guidelines are used for international arrivals, with Omicron variant cases updated by the Union Health Ministry in January 2022. …"
-
649
A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
650
-
651
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
منشور في 2022"…We also propose the metricCold Items Precision(CIP) to quantify the ability of a system to recommend cold-start items. CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.…"
-
652
Axes-Based Encryption Key
منشور في 2018"…For this, a need of robust security systems is raised to ensure that our data will be kept safe. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
653
Shuffled Linear Regression with Erroneous Observations
منشور في 2019"…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
654
Heat rate curve approximation for power plants without data measuring devices
منشور في 2012"…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …"
احصل على النص الكامل
article -
655
-
656
-
657
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…Therefore, the proposed work aims to develop a Decentralized Identifiable Distributed Ledger Technology‐Blockchain (DIDLT‐BC) framework that is intelligent and effective, requiring the least amount of computing complexity to ensure cloud IoT system safety. In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …"
-
658
A neuro-heuristic approach for segmenting handwritten Arabic text. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
659
Scrambled Prime Key Encryption
منشور في 2018احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
660
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
منشور في 2025"…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …"