Search alternatives:
using algorithm » cosine algorithm (Expand Search)
upon algorithm » auction algorithm (Expand Search), colony algorithm (Expand Search)
models using » model using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
upon algorithm » auction algorithm (Expand Search), colony algorithm (Expand Search)
models using » model using (Expand Search)
-
621
Creating and detecting fake reviews of online products
Published 2022“…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. …”
-
622
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …”
-
623
Parallel processing
Published 2005“…The parallel genetic algorithm is based on a model of natural evolution. …”
Get full text
Get full text
Get full text
conferenceObject -
624
A Novel Centrality-Based Approach for Link Prediction
Published 2025“…Namely, we consider weighted betweenness, closeness and Katz centralities, in addition to the Resource Allocation and Adamic-Adar indices. We also use a genetic algorithm to optimize the weights of these metrics, reflecting their contributions to link prediction. …”
Get full text
Get full text
Get full text
masterThesis -
625
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
-
626
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017Get full text
Get full text
Get full text
conferenceObject -
627
An automated temporal partitioning tool for a class of DSP applications
Published 1998Get full text
Get full text
Get full text
conferenceObject -
628
Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls
Published 2025“…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …”
Get full text
-
629
Enhancing e-learning through AI: advanced techniques for optimizing student performance
Published 2024“…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …”
-
630
Control of cardiac alternans by mechanical and electrical feedback
Published 2014“…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …”
Get full text
article -
631
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Published 2023“…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
Get full text
-
632
-
633
Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose
Published 2020“…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …”
-
634
Improving the security of SNMP in wireless networks
Published 2017“…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
635
Robustness evaluation of real-Time Protocols
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
636
Computational evluation of protein energy functions
Published 2014“…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …”
Get full text
Get full text
Get full text
conferenceObject -
637
-
638
Estimation of power grid topology parameters through pilot signals
Published 2016Get full text
Get full text
Get full text
conferenceObject -
639
Robustness testing of composed real-time systems
Published 2010Get full text
Get full text
Get full text
Get full text
article -
640
A machine learning approach for localization in cellular environments
Published 2018“…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. The proposed localization scheme integrates a weighted K-nearest neighbor (WKNN) and a multilayer neural network. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject