يعرض 321 - 340 نتائج من 545 نتيجة بحث عن '(( element method algorithm ) OR ((( data processing algorithm ) OR ( from learning algorithm ))))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 321

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments حسب Raun, Kristo

    منشور في 2023
    "…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  2. 322

    Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…This paper addresses the high volatility of PV power by proposing a precise and reliable ensemble learning model for short-term PV power generation forecasting. …"
  3. 323

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
  4. 324

    A heuristics for HTTP traffic identification in measuring user dissimilarity حسب Adeyemi R. Ikuesan (14157123)

    منشور في 2020
    "…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …"
  5. 325

    Precision nutrition: A systematic literature review حسب Daniel Kirk (17302798)

    منشور في 2021
    "…As such, recent research has applied machine learning algorithms, tools, and techniques in precision nutrition for different purposes. …"
  6. 326

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks حسب Mohamed Massaoudi (16888710)

    منشور في 2024
    "…The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …"
  7. 327

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …"
  8. 328

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …"
    احصل على النص الكامل
  9. 329

    Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels حسب Bernard J. Jansen (7434779)

    منشور في 2023
    "…<p dir="ltr">Although the effect of hyperparameters on algorithmic outputs is well known in machine learning, the effects of hyperparameters on information systems that produce user or customer segments are relatively unexplored. …"
  10. 330

    Investigation of Forming a Framework to shortlist contractors in the tendering phase حسب DABASH, MOHANNAD SALAH

    منشور في 2022
    "…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
    احصل على النص الكامل
  11. 331
  12. 332
  13. 333

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
  14. 334

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  15. 335

    Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma حسب Rawan AlSaad (14159019)

    منشور في 2019
    "…In this paper, we build upon the contextual decomposition (CD) method, an algorithm for producing importance scores from long short-term memory networks (LSTMs). …"
  16. 336
  17. 337

    Correlation Clustering with Overlaps حسب Fakhereldine, Amin

    منشور في 2020
    "…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 338

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
  19. 339

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... حسب Mohamed, AlShuweihi

    منشور في 2020
    "…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
    احصل على النص الكامل
  20. 340

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…This SDN-ML-IoT uses a Machine Learning (ML) method in a Software-Defined Networking (SDN) environment in order to protect smart home IoT devices from DDoS attacks. …"