-
1
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
Published 2016Subjects: Get full text
doctoralThesis -
2
-
3
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
4
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The performance of three machine learning (ML) algorithms was assessed to predict the wild blueberry harvest losses on the ground. …”
-
5
-
6
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
Get full text
Get full text
-
7
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …”
Get full text
article -
8
-
9
Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation
Published 2024“…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …”
-
10
Evolution Of Activation Functions for Neural Architecture Search
Published 2020Get full text
Get full text
Get full text
masterThesis -
11
Android Malware Detection Using Machine Learning
Published 2024“…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …”
Get full text
article -
12
-
13
-
14
-
15
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
-
16
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”
-
17
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…An intrusion detection system (IDS) is the most promising solution for preventing malicious intrusions and tracing suspicious network behavioral patterns. Machine learning (ML) methods are widely used in IDS. …”
-
18
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
Get full text
Get full text
-
19
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
Published 2021“…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …”
-
20
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”