يعرض 61 - 80 نتائج من 181 نتيجة بحث عن '(( elementary rd algorithm ) OR ((( data code algorithm ) OR ( based training algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 61
  2. 62
  3. 63

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
  4. 64

    Indoor Localization Based on Floor Plans and Power Maps حسب Khalifeh, Joe J.

    منشور في 2015
    "…An indoor localization algorithm that is based on fingerprinting and trilateration is developed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 65
  6. 66
  7. 67
  8. 68

    DRL-Based IRS-Assisted Secure Visible Light Communications حسب Danya A. Saifaldeen (19498705)

    منشور في 2022
    "…The DDPG-based algorithm provides an optimized solution that can adapt to the large size of design parameters and act fast to the channel variations due to users’ mobility. …"
  9. 69

    Practical Multiple Node Failure Recovery in Distributed Storage Systems حسب Itani, M.

    منشور في 2016
    "…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 70

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT حسب Dhananjay Bisen (19482454)

    منشور في 2023
    "…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …"
  11. 71

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
  12. 72
  13. 73
  14. 74

    Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter حسب Saleh Alhazbi (16869960)

    منشور في 2020
    "…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …"
  15. 75

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
  16. 76
  17. 77

    Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output حسب Kaif Ahmed Lodi (16855518)

    منشور في 2020
    "…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. …"
  18. 78
  19. 79

    Ensemble Deep Random Vector Functional Link Neural Network for Regression حسب Minghui Hu (2457952)

    منشور في 2022
    "…To address this problem, we propose a random skip connection-based edRVFL, which can keep the diversity in the latent space. esc-RVFL is an ensemble scheme that utilizes several edRVFL-RSC models trained on the different folds of the training dataset. …"
  20. 80