بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
721
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
-
722
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
723
Scatter search technique for exam timetabling
منشور في 2011"…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
724
SemIndex: Semantic-Aware Inverted Index
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
725
-
726
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…This article provides an updated review of the cutting-edge machine learning and data-driven techniques used for PGP in networked PSs. …"
-
727
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
-
728
-
729
A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies
منشور في 2024"…Study selection, quality assessment, and data extraction were performed independently by four authors. …"
-
730
Precision nutrition: A systematic literature review
منشور في 2021"…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …"
-
731
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
732
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
733
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
734
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
منشور في 2018"…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
-
735
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
-
736
Automated liver tissues delineation techniques: A systematic survey on machine learning current trends and future orientations
منشور في 2023"…Hence, in this paper, we survey the key studies that are published between 2014 and 2022, showcasing the different machine learning algorithms researchers have used to segment the liver, hepatic tumors, and hepatic-vasculature structures. …"
-
737
Localizing-ground Transmitters Using Airborne Antenna Array
منشور في 2020احصل على النص الكامل
doctoralThesis -
738
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…Finally, we explore the viability and the relevance of our propositions by applying the defined approach for systematic security hardening to develop case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article