Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
relating » regulating (Expand Search), relations (Expand Search), relative (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
relating » regulating (Expand Search), relations (Expand Search), relative (Expand Search)
-
681
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The results have shown a high potential of using automated architecture search mechanism for solving various problems in the field of genomics.…”
-
682
A decentralized load balancing approach for parallel search-tree optimization
Published 2017“…As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
683
-
684
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…In this paper, a recent swarm intelligence metaheuristic method called RSO which is inspired by the social and hunting behavior of a group of rats is enhanced and explored for FS problems. The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
685
Experimental evaluation of multi-agent reinforcement learning in real-world scale-free networks
Published 2010“…However, the study and analysis of the state-of-the-art multi-agent reinforcement learning (MARL) algorithms have been limited to small problems involving few number of learning agents.The purpose of this project is to conduct an extensive evaluation and comparison of MARL algorithms when used in networks that exhibit the scale-free property. …”
Get full text
-
686
Finite volume central schemes for three-dimensional ideal MHD
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
687
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
-
688
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
689
Precision nutrition: A systematic literature review
Published 2021“…Four machine learning tasks are seen in the form of regression, classification, recommendation and clustering, with most of these utilizing a supervised approach. In total, 30 algorithms were used, with 19 appearing more than once. …”
-
690
Central schemes for ideal magnetohydrodynamics
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
691
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
Published 2025“…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …”
-
692
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
Get full text
Get full text
Get full text
article -
693
An aspect-oriented framework for systematic security hardening of software
Published 2008“…In this thesis, we address the problems related to the security hardening of open source software. …”
Get full text
Get full text
Get full text
masterThesis -
694
-
695
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
-
696
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
697
A new method for broad‐scale modeling and projection of plant assemblages under climatic, biotic, and environmental cofiltering
Published 2023“…To this purpose, we first used multilabel algorithms in order to convert the task of explaining a large assemblage of plant communities into a classification framework able to capture with high cross-validated accuracy the pattern of species distributions under a composite set of biotic and abiotic factors. …”