Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
161
-
162
-
163
Extreme Early Image Recognition Using Event-Based Vision
Published 2023“…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
-
164
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
-
165
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
166
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
-
167
-
168
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…Since we use Multi-objects to track, the Joint Probability Distribution Function (JPDA) estimates the best measurement values with a preset gating threshold. …”
Get full text
-
169
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006“…This paper presents an artificial neural network (ANN) approach to the forecasting of exchange rate movements during periods of currency crises characterized by excessive volatility. The models are built using the feedforward ANN structure trained by the backpropagation algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
170
Correlation Clustering with Overlaps
Published 2020“…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
171
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
Published 2024“…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …”
-
172
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
173
Squirrel Search Algorithm for Portfolio Optimization
Published 2019“…It aims for finding the best allocation of resources for a set of assets. …”
Get full text
Get full text
Get full text
masterThesis -
174
Approximation algorithms inspired by kernelization nethods
Published 2017“…We will expose in this paper a similar strategy for obtaining polynomial-time approximation algorithms. Our method features the use of approximation-preserving reductions, akin to the notion of parameterized reductions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
175
Stochastic Search Algorithms for Exam Scheduling
Published 2007“…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
Get full text
Get full text
article -
176
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Techniques for natural language processing may be used to text data to extract useful features like sentiment, emotion, and subjectivity. …”
Get full text
-
177
-
178
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
179
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
180
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…”
Get full text
article