Showing 81 - 100 results of 110 for search '(( element mold algorithm ) OR ((( data code algorithm ) OR ( statistical modeling algorithm ))))*', query time: 0.10s Refine Results
  1. 81

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study by Alaa Abd-alrazaq (17058018)

    Published 2024
    “…Furthermore, future studies could evaluate more efficient modeling algorithms, especially those combining topic modeling with statistical uncertainty quantification, such as conformal prediction.…”
  2. 82
  3. 83

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  4. 84

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  5. 85

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  6. 86

    StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features by Muhammad Arif (769250)

    Published 2024
    “…Additionally, we applied the local interpretable model-agnostic explanations (LIME) algorithm to understand the contribution of selected features to the overall prediction. …”
  7. 87

    Combinatorial method for bandwidth selection in wind speed kernel density estimation by El Dakkak, Omar

    Published 2019
    “…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
    Get full text
  8. 88

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  9. 89

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  10. 90
  11. 91
  12. 92
  13. 93
  14. 94

    A COMPLETE INSPECTION PLAN FOR DEPENDENT MULTICHARACTERISTIC CRITICAL COMPONENTS by Duffuaa, S. O.

    Published 2020
    “…A mathematical model and an algorithm for obtaining the optimal number of repeat inspections are developed and demonstrated by an example. …”
    Get full text
    article
  15. 95

    Connectionist technique estimates of hydrogen storage capacity on metal hydrides using hybrid GAPSO-LSSVM approach by Sina Maghsoudy (21393539)

    Published 2024
    “…So the HGAPSO-LSSVM model had the highest accuracy. In this model, the statistical factors of R<sup>2</sup>, STD, MSE, RMSE, and MRE were 0.980, 0.043, 0.0020, 0.045, and 0.972%, respectively. …”
  16. 96

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning by Md Nazmul Islam Shuzan (21842426)

    Published 2024
    “…Bagged Ensemble Trees outperform other algorithms in estimating blood glucose level with a correlation coefficient of 0.90. …”
  17. 97
  18. 98

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Enormous amounts of data collected from social networks or other online platforms are being published publicly for the sake of statistics, marketing, and research, among other objectives. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 99

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…In summary, we note that minimally perturbing an input to change a model’s output—a major strength of adversarial attacks—is a weakness that leaves unique statistical marks reflected in the cumulative contribution scores of the input. …”
    Get full text
    Get full text
    Get full text
    article
  20. 100

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…In summary, we note that minimally perturbing an input to change a model’s output—a major strength of adversarial attacks—is a weakness that leaves unique statistical marks reflected in the cumulative contribution scores of the input. …”