يعرض 101 - 120 نتائج من 206 نتيجة بحث عن '(((( elements data algorithm ) OR ( recent data algorithm ))) OR ( implement learning algorithm ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 101

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review حسب Asma Alamgir (18288895)

    منشور في 2021
    "…There is a need for more reviews to learn the obstacles to the implementation of AI technologies in clinical settings. …"
  2. 102
  3. 103

    A novel few shot learning derived architecture for long-term HbA1c prediction حسب Marwa Qaraqe (10135172)

    منشور في 2024
    "…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…"
  4. 104

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios حسب Hasan Abbas Al-Mohammed (16810674)

    منشور في 2021
    "…In addition, an implementation scenario for securing IoT communications for sensors deployed in railroad networks is described. …"
  5. 105

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE حسب Mathew, Elezabeth

    منشور في 2020
    "…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …"
    احصل على النص الكامل
  6. 106

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  7. 107

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle حسب Reza Jafari (3494018)

    منشور في 2025
    "…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …"
  8. 108

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
  9. 109

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  10. 110

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  11. 111

    Single channel speech denoising by DDPG reinforcement learning agent حسب Sania Gul (18272227)

    منشور في 2025
    "…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …"
  12. 112

    Correlation Clustering with Overlaps حسب Fakhereldine, Amin

    منشور في 2020
    "…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  13. 113
  14. 114

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …"
  15. 115
  16. 116

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…This SDN-ML-IoT uses a Machine Learning (ML) method in a Software-Defined Networking (SDN) environment in order to protect smart home IoT devices from DDoS attacks. …"
  17. 117
  18. 118
  19. 119

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…<p dir="ltr">Federated learning has emerged as a prominent privacy-preserving technique for leveraging large-scale distributed datasets by sharing gradients instead of raw data. However, recent studies indicate that private training data can still be exposed through gradient inversion attacks. …"
  20. 120

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …"
    احصل على النص الكامل