Search alternatives:
learning algorithm » learning algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
learning algorithm » learning algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
-
61
Optical recognition of electrical circuit drawings
Published 1997Get full text
Get full text
article -
62
-
63
-
64
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”
-
65
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
66
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997Get full text
Get full text
article -
67
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
-
68
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …”
-
69
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
70
Large-scale annotation dataset for fetal head biometry in ultrasound images
Published 2023“…The dataset was assembled under the Creative Commons Attribution 4.0 International license, using previously anonymized and de-identified images to maintain ethical standards. Each image is complemented by a CSV file detailing pixel size in millimeters (mm). …”
-
71
-
72
Connectionist technique estimates of hydrogen storage capacity on metal hydrides using hybrid GAPSO-LSSVM approach
Published 2024“…With this purpose, a total number of 244 pairs of AB<sub>2 </sub>alloys including the elements and their respective hydrogen storage capacity were collected from the literature. …”
-
73
Approximate XML structure validation technical report
Published 2014Get full text
Get full text
Get full text
article -
74
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
75
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article