Search alternatives:
learning algorithm » learning algorithms (Expand Search)
image scheduling » task scheduling (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data learning » deep learning (Expand Search)
Showing 61 - 80 results of 337 for search '(( elements data algorithm ) OR ((( image scheduling algorithm ) OR ( data learning algorithm ))))', query time: 0.16s Refine Results
  1. 61
  2. 62

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
  3. 63

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  4. 64
  5. 65

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…<p>Predictive performance of Machine Learning (ML) models rely on the quality of data used for training the models. …”
  6. 66

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  7. 67

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm by Saima Hassan (14918003)

    Published 2022
    “…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
  8. 68

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  9. 69

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
  10. 70

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…This paper presents a machine learning approach for Android malware detection. In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …”
    Get full text
    article
  11. 71

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  12. 72
  13. 73

    Artificial intelligence-based methods for fusion of electronic health records and imaging data by Farida Mohsen (16994682)

    Published 2022
    “…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …”
  14. 74

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  15. 75

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”