Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
-
501
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
502
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …”
-
503
-
504
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
505
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
Published 2020“…Since the UAHPL model is directly related to hardware, this approach is better than those based on ordinary high-level languages or special microprogram languages. …”
Get full text
article -
506
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
507
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
508
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
Published 2022“…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
-
509
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Lung-EffNet is built based on the architecture of EfficientNet and further modified by adding top layers in the classification head of the model. …”
-
510
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
Get full text
-
511
Fuzzy controllers design using space-filling curves
Published 1998“…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …”
Get full text
Get full text
article -
512
Fuzzy Controllers Design Using Space-Filling Curves
Published 2020“…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …”
Get full text
article -
513
-
514
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
Published 2025“…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
-
515
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…With a slightly reduced PESQ score (by 0.58 points), the proposed model offers an improvement of 2 % in STOI, and 4375 and 1135 times reduction respectively in the required number of training epochs and network parameters when compared to a GAN-based model augmented by WavLM; a large-scale self-supervised learning model. …”
-
516
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
Published 2021“…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
-
517
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
518
Identification of phantom movements with an ensemble learning approach
Published 2022“…Our study demonstrated that the ensemble learning-based models resulted in higher accuracy in the detection of phantom movements. …”
-
519
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
520
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis