Search alternatives:
learning algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data learning » deep learning (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
learning algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data learning » deep learning (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
-
321
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis -
322
A multi-pretraining U-Net architecture for semantic segmentation
Published 2025“…In this research, we propose and evaluate a modified version of a deep learning algorithm called U-Net architecture for partitioning histopathological images. …”
-
323
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…In all likelihood, while features from several modalities may enhance the classification performance, they might exhibit high dimensionality and make the learning process complex for the most used machine learning algorithms. …”
Get full text
Get full text
-
324
-
325
Investigation of Forming a Framework to shortlist contractors in the tendering phase
Published 2022“…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
Get full text
-
326
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
-
327
Predicting COVID-19 cases using bidirectional LSTM on multivariate time series
Published 2022“…Unlike other forecasting techniques, our proposed approach first groups the countries having similar demographic and socioeconomic aspects and health sector indicators using K-means clustering algorithm. The cumulative case data of the clustered countries enriched with data related to the lockdown measures are fed to the bidirectional LSTM to train the forecasting model. …”
-
328
Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier
Published 2021“…Specifically, short local histograms are drawn to represent individual appliance consumption signatures and robustly extract appliance-level data from the aggregated power signal. Furthermore, an improved k-nearest neighbors (IKNN) algorithm is presented to reduce the learning computation time and improve the classification performance. …”
-
329
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
Get full text
Get full text
Get full text
Get full text
article -
330
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …”
-
331
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
Published 2024“…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
Get full text
-
332
Predicting insulin dosage for diabetic patients to reach optimal glucose levels. (c2012)
Published 2012Get full text
Get full text
masterThesis -
333
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …”
-
334
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
335
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
336
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
Get full text
-
337
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
338
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
339
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …”
Get full text
-
340
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”