Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
-
521
The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns
Published 2024“…However, the adoption of AI also presents challenges, including potential biases in algorithms, privacy concerns, and the risk of an over-reliance on automated systems. …”
Get full text
-
522
MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network
Published 2022“…Because the diagnosis of many neurological diseases is heavily reliant on clean EEG data, it is critical to eliminate motion artifacts from motion-corrupted EEG signals using reliable and robust algorithms. …”
-
523
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
Published 2025“…Techniques (e.g., model ensembling and multimodal data integration) are needed for better multiclass classification. …”
-
524
Cooperative Caching Policy in Fog Computing for Connected Vehicles
Published 2023“…Furthermore, the results showed the proposed model's effectiveness compared to traditional algorithms.…”
Get full text
Get full text
Get full text
masterThesis -
525
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …”
-
526
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
527
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. Since the introduction of the Lee sigma filter in 1980, the various versions of the minimum mean square error (MMSE) filter were developed, focusing essentially on how to estimate the processed pixels. …”
Get full text
article -
528
FoGMatch
Published 2019“…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
529
-
530
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…We also explore a range of algorithms, including traditional classifiers and deep learning models, to determine and select the most suitable and accurate models of identifying poets' names from the verses. …”
Get full text
-
531
Developing an online hate classifier for multiple social media platforms
Published 2020“…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …”
-
532
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
533
A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies
Published 2024“…The fingerprinting and descriptors are two commonly approach for polymer featurization. In terms of algorithms, <u>neural networks</u> (NNs), random forest (RF), and gaussian process regression (GPR) are among the most extensively applied methods. …”
-
534
Precision nutrition: A systematic literature review
Published 2021“…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …”
-
535
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …”
Get full text
article -
536
-
537
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. Subsequently, we used our best-performing model, a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) model that achieved an area under the receiver operating characteristic curve (AUC) score of 0.983 to detect toxicity. …”
-
538
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
539
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
540
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …”