Showing 81 - 100 results of 152 for search '(((( element ii algorithm ) OR ( element data algorithm ))) OR ( implement learning algorithm ))', query time: 0.15s Refine Results
  1. 81

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review by Asma Alamgir (18288895)

    Published 2021
    “…There is a need for more reviews to learn the obstacles to the implementation of AI technologies in clinical settings. …”
  2. 82
  3. 83

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…”
  4. 84

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios by Hasan Abbas Al-Mohammed (16810674)

    Published 2021
    “…In addition, an implementation scenario for securing IoT communications for sensors deployed in railroad networks is described. …”
  5. 85

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
  6. 86

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…Based on the proposed algorithm, several IPT systems are optimized in MATLAB software using Genetic Algorithm (GA). …”
  7. 87

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle by Reza Jafari (3494018)

    Published 2025
    “…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …”
  8. 88

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
  9. 89

    The automation of the development of classification models and improvement of model quality using feature engineering techniques by Sjoerd Boeschoten (17347045)

    Published 2023
    “…The proposed framework is extendable and configurable by adding algorithms supported by the CARET package implemented in the R programming language. …”
  10. 90

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”
  11. 91

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  12. 92

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 93

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…This SDN-ML-IoT uses a Machine Learning (ML) method in a Software-Defined Networking (SDN) environment in order to protect smart home IoT devices from DDoS attacks. …”
  14. 94

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  15. 95

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
    Get full text
  16. 96
  17. 97
  18. 98

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…The BRNN model, refined using the Adagrad optimization algorithm, efficiently integrates the learned features from both branches. …”
  19. 99

    Toward automatic motivator selection for autism behavior intervention therapy by Siyam, Nur

    Published 2022
    “…The states, actions and rewards design consider the factors that impact the efectiveness of a motivator based on applied behavior analysis as well as learners’ individual preferences. We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …”
    Get full text
    Get full text
  20. 100

    Cooperative Caching Policy in Fog Computing for Connected Vehicles by Ghazleh, Ali

    Published 2023
    “…In this thesis, we implemented cooperation between a Deep Reinforcement Learning (DRL) model and Federated Learning to improve caching in Connected Vehicles connected to fog nodes. …”
    Get full text
    Get full text
    Get full text
    masterThesis