Showing 1 - 20 results of 20 for search '(( ((algorithm python) OR (algorithm etc)) function ) OR ( algorithms adopted function ))', query time: 0.11s Refine Results
  1. 1
  2. 2

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…Drawing on the Behavioral Reasoning Theory (BRT), the paper establishes relationships between the enablers and inhibitors on the adoption intention of voice assistants. To examine the hypothesized relationship, a quantitative approach employing PLS-SEM was utilized to evaluate a representative sample of 1189 Indian consumers and examining the psychological and functional constructs leading to adoption intention for voice assistants. …”
  3. 3

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…<p>Neural networks have been successfully employed in various domains such as classification, regression and clustering, etc. Generally, the back propagation (BP) based iterative approaches are used to train the neural networks, however, it results in the issues of local minima, sensitivity to learning rate and slow convergence. …”
  4. 4
  5. 5

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …”
  6. 6

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods by Abu Zitar, Raed

    Published 2023
    “…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
    Get full text
  7. 7

    ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation by Said Mahfoud (17150968)

    Published 2022
    “…The new combined ACO-DTC strategy has been studied for optimizing the gains of the PID controller by using a cost function such as Integral Square Error (ISE). The proposed approach is implemented on Matlab/Simulink to validate the objectives adopted by this strategy. …”
  8. 8
  9. 9

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition by Abboud, Ralph

    Published 2019
    “…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 10

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…Unlike standard machine learning approaches such as PCA, LDA, SVM, RF, GBM etc, DeepRaman functions independently, requiring no human interaction, and can be used to much smaller datasets than traditional CNNs. …”
    Get full text
    Get full text
    Get full text
    article
  11. 11
  12. 12

    A Hybrid Transfer Learning Approach to Teeth Diagnosis Using Orthopantomogram Radiographs by Alabd-Aljabar, Ahmed

    Published 2024
    “…Despite this, concerns about the accuracy and function of automated diagnosis remain among patients. …”
    Get full text
    article
  13. 13

    A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performance by Krishnamoorthy Natarajan (22047464)

    Published 2024
    “…<p dir="ltr">A disease is a distinct abnormal state that significantly affects the functioning of all or part of an individual and is not caused by external harm. …”
  14. 14

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  16. 16

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 17

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…This integration is usually referred to as Genetic Fuzzy systems (GFS) where different researchers adopted different techniques to achieve the functionality of GFS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 18

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 19

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks by Insaf Kraidia (19198012)

    Published 2024
    “…A cumulative updating loss function was employed for overall optimization, demonstrating remarkable superiority over traditional optimization techniques. …”
  20. 20

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text