بدائل البحث:
data algorithms » jaya algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
finding » findings (توسيع البحث)
data algorithms » jaya algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
finding » findings (توسيع البحث)
-
721
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
722
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
723
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
724
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
منشور في 2018"…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
-
725
Exploring AI Conversational Chatbot UX Design: Insights from High School
منشور في 2025"…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …"
احصل على النص الكامل
-
726
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
منشور في 2009"…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
727
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
728
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …"
احصل على النص الكامل
-
729
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
منشور في 2020"…It is here. Implementing PM in routine clinical care does require some investment and infrastructure development. …"