Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
161
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
162
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…It achieves this performance by utilizing data that is 7 times smaller than that required by other models. …”
-
163
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
-
164
Robustness evaluation of real-Time Protocols
Published 2006“…In this paper, we suggest a methodology for measuring the degree of robustness for Real-Time Component-Based Systems (RTCBS). Each component of the RTCBS system is modeled as a Timed Labeled Transition System (TLTS). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
165
-
166
Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry
Published 2016“…The algorithm employs a sliding time window that assimilates at once and inside each frame, an entire trajectory of drifters. …”
Get full text
Get full text
Get full text
Get full text
article -
167
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
Published 2024“…Furthermore, the proposed models were deployed in Amazon Web Server. The wristband is connected to an Android mobile application to collect real-time data and update the estimated glucose and diabetic severity every 10-seconds, which will allow the users to gain better control of their diabetic health.…”
-
168
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
169
-
170
Correlation Clustering with Overlaps
Published 2020“…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
171
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
-
172
A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48
Published 2022“…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …”
Get full text
-
173
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
174
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
Get full text
Get full text
masterThesis -
175
A Tabu Search algorithm for mapping data to multicomputers. (c1997)
Published 1997Get full text
Get full text
masterThesis -
176
Improvement Algorithm for Limited Space Scheduling
Published 2001“…This paper addresses the combined problem termed “space scheduling” and presents an algorithmic time-space trade-off model for adjusting activity durations and start dates to decrease the need for space over congested time periods. …”
Get full text
Get full text
article -
177
Predicting Plasma Vitamin C Using Machine Learning
Published 2022“…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
-
178
Stochastic Search Algorithms for Exam Scheduling
Published 2007“…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
Get full text
Get full text
article -
179
-
180
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article