بدائل البحث:
system algorithm » swarm algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
system algorithm » swarm algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
121
-
122
Towards Multimedia Fragmentation
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
123
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…In this context, this paper presents an improved framework (SDN-ML-IoT) that works as an Intrusion and Prevention Detection System (IDPS) that could help to detect DDoS attacks with more efficiency and mitigate them in real time. …"
-
124
-
125
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
126
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
منشور في 2009احصل على النص الكامل
doctoralThesis -
127
-
128
Mobile Robot Trajectory Tracking Using Neural Networks
منشور في 2009احصل على النص الكامل
doctoralThesis -
129
-
130
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
منشور في 2025"…We comprehensively analyse the proposed ensemble learning, including algorithmic details, implementation specifics, and experimental results. …"
-
131
An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study
منشور في 2022"…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …"
-
132
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…In this study, we present the BDA-SCV architecture for implementing a version control system in blockchain technology. …"
-
133
-
134
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
-
135
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …"
احصل على النص الكامل
-
136
-
137
-
138
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
-
139
Adaptive temperature control of a reverse flow process by using reinforcement learning approach
منشور في 2024"…Additionally, a second algorithm is presented to enhance the implementability of the reinforcement learning algorithm from a practical perspective. …"
-
140