بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
-
1
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
منشور في 2021"…On the other hand, keystroke dynamics-based systems achieve very high accuracy but have low anti-spoofing capability. …"
-
2
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …"
احصل على النص الكامل
احصل على النص الكامل
-
3
-
4
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
منشور في 2022الموضوعات: -
5
-
6
-
7
Predicting Dropouts among a Homogeneous Population using a Data Mining Approach
منشور في 2019"…Our research relies solely on pre-college and college performance data available in the institutional database. Our research reveals that the Gradient Boosted Trees is a robust algorithm that predicts dropouts with an accuracy of 79.31% and AUC of 88.4% using only pre-enrollment data. …"
احصل على النص الكامل
-
8
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
منشور في 2023"…Algorithms were tested using the test power system IEEE39. …"
احصل على النص الكامل
article -
9
Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
منشور في 2023"…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …"
-
10
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
-
11
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
منشور في 2021"…We research and test the design of the right neural networks that achieves our goal. A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …"
احصل على النص الكامل
احصل على النص الكامل
-
12
-
13
-
14
-
15
Personalization in Real-Time Physical Activity Coaching Using Mobile Applications: A Scoping Review
منشور في 2019الموضوعات: -
16
-
17
Android Malware Detection Using Machine Learning
منشور في 2024"…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
احصل على النص الكامل
article -
18
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
-
19
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020الموضوعات: -
20
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
منشور في 2020"…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …"
احصل على النص الكامل