Showing 161 - 180 results of 843 for search '(((( time modeling algorithm ) OR ( data using algorithm ))) OR ( element data algorithm ))', query time: 0.13s Refine Results
  1. 161
  2. 162

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…It achieves this performance by utilizing data that is 7 times smaller than that required by other models. …”
  3. 163

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  4. 164

    Robustness evaluation of real-Time Protocols by Tarhini, Abbas

    Published 2006
    “…In this paper, we suggest a methodology for measuring the degree of robustness for Real-Time Component-Based Systems (RTCBS). Each component of the RTCBS system is modeled as a Timed Labeled Transition System (TLTS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 165
  6. 166

    Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry by Issa, Leila

    Published 2016
    “…The algorithm employs a sliding time window that assimilates at once and inside each frame, an entire trajectory of drifters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 167

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning by Md Nazmul Islam Shuzan (21842426)

    Published 2024
    “…Furthermore, the proposed models were deployed in Amazon Web Server. The wristband is connected to an Android mobile application to collect real-time data and update the estimated glucose and diabetic severity every 10-seconds, which will allow the users to gain better control of their diabetic health.…”
  8. 168

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  9. 169
  10. 170

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 171

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
  12. 172

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 by Al-Manaseer, Hitham

    Published 2022
    “…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …”
    Get full text
  13. 173

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems by Faria Nawshin (21841598)

    Published 2025
    “…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
  14. 174

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
    Get full text
    Get full text
    masterThesis
  15. 175
  16. 176

    Improvement Algorithm for Limited Space Scheduling by Zouein, Pierrette

    Published 2001
    “…This paper addresses the combined problem termed “space scheduling” and presents an algorithmic time-space trade-off model for adjusting activity durations and start dates to decrease the need for space over congested time periods. …”
    Get full text
    Get full text
    article
  17. 177

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
  18. 178

    Stochastic Search Algorithms for Exam Scheduling by Mansour, Nashat

    Published 2007
    “…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
    Get full text
    Get full text
    article
  19. 179
  20. 180

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
    Get full text
    article