Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data learning » deep learning (Expand Search)
element » elements (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data learning » deep learning (Expand Search)
element » elements (Expand Search)
-
121
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published 2024“…Finally, this study proposed a novel multi-view learning framework that analyzes multi-source data and generates fine clusters efficiently.…”
-
122
-
123
-
124
Deep and transfer learning for building occupancy detection: A review and comparative analysis
Published 2022“…This article provides an in-depth survey of the strategies used to analyze sensor data and determine occupancy. The article’s primary emphasis is on reviewing deep learning (DL), and transfer learning (TL) approaches for occupancy detection. …”
-
125
-
126
-
127
A Survey of Machine Learning Innovations in Ambulance Services: Allocation, Routing, and Demand Estimation
Published 2024“…<p dir="ltr">In the realm of Emergency Medical Services (EMS), the integration of Machine Learning (ML) techniques has emerged as a catalyst for revolutionizing ambulance operations. …”
-
128
Deep Learning-Based Fault Diagnosis of Photovoltaic Systems: A Comprehensive Review and Enhancement Prospects
Published 2021“…Recently, due to the enhancement of computing capabilities, the increase of the big data use, and the development of effective algorithms, the deep learning (DL) tool has witnessed a great success in data science. …”
-
129
Distributed DRL-Based Downlink Power Allocation for Hybrid RF/VLC Networks
Published 2021“…Our simulation results show that the distributed DDPG-based algorithm learns to adapt against changes in the channel or user requirements, while centralized Genetic Algorithm and Particle Swarm Optimization-based algorithms fail to endure against these changes even with coordination between APs. …”
-
130
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…<p dir="ltr">Federated learning has emerged as a prominent privacy-preserving technique for leveraging large-scale distributed datasets by sharing gradients instead of raw data. …”
-
131
-
132
-
133
-
134
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…In the initial phase, the proposed HNIDS utilizes hybrid EGA-PSO methods to enhance the minor data samples and thus produce a balanced data set to learn the sample attributes of small samples more accurately. …”
-
135
-
136
-
137
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
138
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…We present an approach based on the simulated evolution algorithm for the design of campus network topology. …”
Get full text
Get full text
article -
139
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
140