Search alternatives:
learning algorithm » learning algorithms (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
learning algorithm » learning algorithms (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
-
361
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
362
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. All possible combinations of the 10 best ranked features were used to generate SVM based prediction models. …”
-
363
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
364
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…In addition to the tertiary study, we also identified recent 112 deep learning-based sentiment analysis papers and categorized them based on the applied deep learning algorithms. …”
-
365
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We build our model using machine learning techniques in particular rule-based models. …”
Get full text
Get full text
masterThesis -
366
-
367
Predicting Android Malware Using Evolution Networks
Published 2025“…With this aim, we introduce evolutionary networks, and particularly the Susceptible-Infectious-Susceptible (SIS) model, as a way to address the limitations of previous studies which are typically based on traditional machine learning models. The SIS model is usually used to represent disease spread between individuals in a population with transition between susceptible and infected states. …”
Get full text
Get full text
Get full text
masterThesis -
368
Mining airline data for CRM strategies. (c2006)
Published 2006Get full text
Get full text
masterThesis -
369
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
-
370
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…<p dir="ltr">This research aims to enhance the safety level and crash resiliency of targeted woven roving glass/epoxy composite material for various industry 4.0 applications. Advanced machine learning algorithms are used in this study to figure out the complicated relationship between the crashworthiness parameters of the hexagonal composite ring specimens under lateral compressive, energy absorption, and failure modes. …”
-
371
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
Published 1997“…It is shown that the performance of FLPSS can be improved significantly by incorporating a genetic based learning mechanism. The performance of the proposed HPSS under different disturbances and loading conditions is investigated. …”
Get full text
Get full text
article -
372
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
373
-
374
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
-
375
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
376
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. …”
Get full text
Get full text
Get full text
masterThesis -
377
Unsupervised outlier detection in multidimensional data
Published 2022“…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
-
378
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…<p>Promoting healthy discourse on community-based online platforms like Reddit can be challenging, especially when conversations show ominous signs of toxicity. …”
-
379
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
380
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
Get full text
Get full text
Get full text
masterThesis