بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
agent » agents (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
agent » agents (توسيع البحث)
-
621
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
622
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
منشور في 2015احصل على النص الكامل
doctoralThesis -
623
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
منشور في 2024"…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …"
-
624
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
منشور في 2024"…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …"
-
625
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
-
626
-
627
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
628
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
منشور في 2024"…These AI algorithms are effective non-invasive biomarkers for cardiovascular illnesses because they can identify subtle patterns and signals in the ECG that may not be readily apparent to human interpreters. …"
-
629
-
630
-
631
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
632
The multi-parameterized cluster editing problem
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
633
Scatter search technique for exam timetabling
منشور في 2011"…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
634
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"