يعرض 641 - 656 نتائج من 656 نتيجة بحث عن '(( element method algorithm ) OR ((( data mining algorithm ) OR ( problem using algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 641

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …"
  2. 642

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…The use of AI in ECG analysis has several benefits, including the quick and precise detection of problems like arrhythmias, silent cardiac illnesses, and left ventricular failure. …"
  3. 643
  4. 644

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 645

    Experimental evaluation of multi-agent reinforcement learning in real-world scale-free networks حسب Al Hashimi, Rashid

    منشور في 2010
    "…However, the study and analysis of the state-of-the-art multi-agent reinforcement learning (MARL) algorithms have been limited to small problems involving few number of learning agents.The purpose of this project is to conduct an extensive evaluation and comparison of MARL algorithms when used in networks that exhibit the scale-free property. …"
    احصل على النص الكامل
  6. 646
  7. 647

    Systematic reviews in sentiment analysis: a tertiary study حسب Alexander Ligthart (14150871)

    منشور في 2022
    "…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …"
  8. 648

    Precision nutrition: A systematic literature review حسب Daniel Kirk (17302798)

    منشور في 2021
    "…Four machine learning tasks are seen in the form of regression, classification, recommendation and clustering, with most of these utilizing a supervised approach. In total, 30 algorithms were used, with 19 appearing more than once. …"
  9. 649
  10. 650

    Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain حسب Farshad Rahimi Ghashghaei (20880995)

    منشور في 2025
    "…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …"
  11. 651

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque, Ahmed

    منشور في 2023
    "…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 652

    An aspect-oriented framework for systematic security hardening of software حسب Mourad, Azzam

    منشور في 2008
    "…In this thesis, we address the problems related to the security hardening of open source software. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  13. 653
  14. 654

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque Ahmed (16517712)

    منشور في 2023
    "…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
  15. 655

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  16. 656

    A new method for broad‐scale modeling and projection of plant assemblages under climatic, biotic, and environmental cofiltering حسب Alessandro Ferrarini (3951098)

    منشور في 2023
    "…To this purpose, we first used multilabel algorithms in order to convert the task of explaining a large assemblage of plant communities into a classification framework able to capture with high cross-validated accuracy the pattern of species distributions under a composite set of biotic and abiotic factors. …"