Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data learning » deep learning (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data learning » deep learning (Expand Search)
element » elements (Expand Search)
-
141
Android Malware Detection Using Machine Learning
Published 2024“…This paper presents a machine learning approach for Android malware detection. In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …”
Get full text
article -
142
-
143
-
144
-
145
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…<p>Recently pipelines of machine learning-based classification models have become important to codify, orchestrate, and automate the workflow to produce an effective machine learning model. …”
-
146
Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility
Published 2019Get full text
Get full text
Get full text
Get full text
conferenceObject -
147
-
148
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
-
149
Large-scale annotation dataset for fetal head biometry in ultrasound images
Published 2023“…It is also compatible with multiple medical imaging software and deep learning frameworks. The reliability of the annotations is verified through a two-step validation process involving a Senior Attending Physician and a Radiologic Technologist. …”
-
150
-
151
-
152
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
-
153
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
154
-
155
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…<h3>Background and Motivations</h3><p dir="ltr">Physiological signals, such as the Photoplethysmogram (PPG) collected through wearable devices, consistently encounter significant motion artifacts. Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …”
-
156
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
-
157
-
158
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
Published 2022“…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
Get full text
-
159
-
160
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”