يعرض 1 - 20 نتائج من 22 نتيجة بحث عن 'data augmentations (algorithms OR algorithm)', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 1

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering حسب Abu Zitar, Raed

    منشور في 2022
    "…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …"
  2. 2

    Efficient Approximate Conformance Checking Using Trie Data Structures حسب Awad, Ahmed

    منشور في 2021
    "…We show how our algorithm supports the definition of a budget for alignment computation and also augment it with strategies for meta-heuristic optimization and pruning of the search space. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  3. 3

    K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation حسب Ashhadul Islam (16869981)

    منشور في 2022
    "…This paper introduces K Nearest Neighbor OveRsampling (KNNOR) Algorithm — a novel data augmentation technique that considers the distribution of data and takes into account the k nearest neighbors while generating artificial data points. …"
  4. 4
  5. 5

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
  6. 6

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks حسب Najam Us Sahar Riyaz (22927843)

    منشور في 2025
    "…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
  7. 7

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights حسب Malekloo, Arman

    منشور في 2021
    "…A detailed analysis of the ML pipelines is provided, and the in-demand methods and algorithms are summarized in augmentative tables and figures. …"
    احصل على النص الكامل
    article
  13. 13

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform حسب Hamed Al-Shaibani (19497412)

    منشور في 2022
    "…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …"
  14. 14

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations حسب Mueen Uddin (4903510)

    منشور في 2025
    "…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …"
  15. 15
  16. 16

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework حسب Tayyabah Hasan (18427887)

    منشور في 2022
    "…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …"
  17. 17

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  18. 18

    Exploring Digital Competitiveness through Bayesian Belief Networks حسب Qazi, Abroon

    منشور في 2025
    "…Three states were assigned to variables—low, medium, and high performance—and the tree augmented naive Bayes (TAN) algorithm was applied to model interdependencies. …"
    احصل على النص الكامل
    article
  19. 19

    A multi-pretraining U-Net architecture for semantic segmentation حسب Cagla Copurkaya (22502042)

    منشور في 2025
    "…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. …"
  20. 20

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…We use a semantic-aware inverted index to allow semantic-aware search, result selection, and result ranking functionality. The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article