Search alternatives:
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data learning » deep learning (Expand Search)
systems using » system using (Expand Search)
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data learning » deep learning (Expand Search)
systems using » system using (Expand Search)
-
1
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…On the other hand, keystroke dynamics-based systems achieve very high accuracy but have low anti-spoofing capability. …”
-
2
-
3
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
Get full text
Get full text
-
4
Personalization in Real-Time Physical Activity Coaching Using Mobile Applications: A Scoping Review
Published 2019Subjects: -
5
-
6
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
7
-
8
-
9
-
10
Predicting Dropouts among a Homogeneous Population using a Data Mining Approach
Published 2019Subjects: Get full text
-
11
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…Algorithms were tested using the test power system IEEE39. …”
Get full text
article -
12
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
-
13
-
14
Predicting Plasma Vitamin C Using Machine Learning
Published 2022“…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
-
15
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
Published 2021“…We research and test the design of the right neural networks that achieves our goal. A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …”
Get full text
Get full text
-
16
-
17
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
Published 2022“…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
Get full text
-
18
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
Published 2022“…This is addressed such that the genetic algorithm (GA) technique is used for selecting the best features and the artificial neural network (ANN) classifier is applied for fault diagnosis. …”
-
19
Android Malware Detection Using Machine Learning
Published 2024“…The results of this work can be used to build more robust systems to protect devices and networks from malicious attacks.…”
Get full text
article -
20
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”