Search alternatives:
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
wt algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
elements wt » elements _ (Expand Search)
implementing » implemented (Expand Search)
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
wt algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
elements wt » elements _ (Expand Search)
implementing » implemented (Expand Search)
-
121
-
122
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
123
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…In this context, this paper presents an improved framework (SDN-ML-IoT) that works as an Intrusion and Prevention Detection System (IDPS) that could help to detect DDoS attacks with more efficiency and mitigate them in real time. …”
-
124
-
125
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
126
-
127
-
128
-
129
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
Published 2025“…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …”
-
130
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…In this study, we present the BDA-SCV architecture for implementing a version control system in blockchain technology. …”
-
131
An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study
Published 2022“…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …”
-
132
-
133
-
134
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
135
-
136
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
Get full text
-
137
Adaptive temperature control of a reverse flow process by using reinforcement learning approach
Published 2024“…Additionally, a second algorithm is presented to enhance the implementability of the reinforcement learning algorithm from a practical perspective. …”
-
138
-
139
Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges
Published 2025“…These are very important steps toward earning trust and ensuring that AI systems are safe, reliable, and fair. </p><h3>Conclusion</h3><p dir="ltr">AI can bring transformative opportunities to improve healthcare outcomes, but successful implementation will depend on overcoming the challenges of trust, security, and ethics. …”
-
140
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”