Search alternatives:
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 401 - 420 results of 733 for search '(( element research algorithm ) OR ((( based method algorithm ) OR ( data processing algorithm ))))', query time: 0.14s Refine Results
  1. 401
  2. 402

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  3. 403

    StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features by Muhammad Arif (769250)

    Published 2024
    “…We believe, StackDPPred could serve as a valuable tool accelerating the screening of large-scale DPs and peptide-based drug discovery process.</p><h2>Other Information</h2> <p> Published in: Methods<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.ymeth.2024.08.001" target="_blank">https://dx.doi.org/10.1016/j.ymeth.2024.08.001</a></p>…”
  4. 404
  5. 405

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”
  6. 406

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…FS is an important data reduction step in data mining which finds the most representative features from the entire data. Many FS-based swarm intelligence algorithms have been used to tackle FS. …”
  7. 407

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review by Avneet Kaur (712349)

    Published 2024
    “…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. …”
  8. 408
  9. 409
  10. 410
  11. 411

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting by Mohamed Massaoudi (16888710)

    Published 2021
    “…Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
  12. 412

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…<p>This work aims to provide an effective hybrid beam forming method with Dual-Deep-Network to overcome overhead for mm-wave massive MIMO systems. …”
  13. 413

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle by Reza Jafari (3494018)

    Published 2025
    “…To this end, three model-free DRL-based methods, based on deep deterministic policy gradient (DDPG), twin delayed deep deterministic policy gradient (TD3), and TD3 enhanced with curriculum learning (CL TD3), are developed for determining optimal yaw moment control and energy optimization online. …”
  14. 414

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…The research methodology undertaken in this paper comprises a combination of different machine learning techniques, predominantly by applying clustering and classification methods. A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
  15. 415

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  16. 416

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”
  17. 417

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We employed an ML method based on Random Forest (RF), Logistic Regression (LR), k-Nearest Neighbors (kNN), and Naive Bayes (NB) with a One-versus-Rest (OvR) strategy and then compared our work to other related works. …”
  18. 418

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  19. 419

    Ensemble Deep Random Vector Functional Link Neural Network for Regression by Minghui Hu (2457952)

    Published 2022
    “…The esc-edRVFL is identified as the best-performing algorithm through a comprehensive evaluation of 31 UCI datasets.…”
  20. 420

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…This study offers a thorough examination of how AI can be utilized to enhance e-learning results by employing advanced predictive methods and performance optimization strategies. The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …”