Search alternatives:
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
i algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
based i » based _ (Expand Search), based iot (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
i algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
based i » based _ (Expand Search), based iot (Expand Search)
-
641
-
642
-
643
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
Published 2023“…To that end, deep transfer learning (DTL) and deep domain adaptation (DDA) have recently been proposed as promising solutions to alleviate these issues. Typically, they can (i) ease the training process, (ii) improve the generalizability of ML and DL models, and (iii) overcome data scarcity problems by transferring knowledge from one domain to another or from one task to another. …”
-
644
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
Published 2022“…Other highlights are (1) a novel set of easily available features for the prediction of the aforementioned clinical complications and (2) the use of data augmentation methods and model-scoring-based hyperparameter tuning to address the problem of class disproportionality, a common challenge in medical datasets and often the reason behind poor event prediction rate of various predictive models reported so far. …”
-
645
-
646
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…We propose two different approaches for encrypting the exchanged messages. The first one is based solely on public key cryptosystems and is, thus, suitable for short, SMS-style messaging. …”
-
647
An XML Document Comparison Framework
Published 2001“…Our approach consists of four main modules for i) discovering the structural commonalities between sub-trees, ii) identifying sub-tree semantic resemblances, iii) computing tree-based edit operations costs, iv) and computing tree edit distance. …”
Get full text
Get full text
Get full text
article -
648
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
Published 2025“…The proposed DRL controllers are benchmarked against model-based controllers, i.e., linear quadratic regulator with the sequential quadratic programming (LSQP) and sliding mode control with SQP (SSQP). …”
-
649
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
Published 2023“…My research aims to fill these identified gaps as I detail below. Since Instagram is one of the most popular social media platforms in UAE, I constructed a dataset of the Emirati dialect from the Instagram platform. …”
Get full text
-
650
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
Get full text
Get full text
Get full text
article -
651
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…The results demonstrate that the suggested RF-ANN-based technique can predict the optimal composite design with high accuracy (precision, recall, and f1-score for test and train dataset were 1). …”
-
652
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…In addition to the tertiary study, we also identified recent 112 deep learning-based sentiment analysis papers and categorized them based on the applied deep learning algorithms. …”
-
653
Scatter search technique for exam timetabling
Published 2011Get full text
Get full text
Get full text
article -
654
Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks
Published 2025“…Specifically, our approach introduces three key innovations: 1) multi-armed bandit (MAB) mechanism for dynamic epsilon-clipping that adaptively adjusts exploration-exploitation trade-offs; 2) meta-controller framework that automatically tunes hyperparameters including the activation learning rate (ALR) penalties and exploration factors; and 3) integrated gradient-based optimization approach that combines policy gradients with environmental feedback. …”
-
655
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
Published 2023“…<p dir="ltr">Data centers serve as the backbone for cloud computing, enterprise services, and infrastructure-based offerings. One area of ongoing research in data center networking focuses on innovating new topologies for large-scale node connectivity. …”
-
656
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…The esc-edRVFL is identified as the best-performing algorithm through a comprehensive evaluation of 31 UCI datasets.…”
-
657
Metallic coating thickness assessment over nonmagnetic metals using eddy current technology
Published 2019Get full text
doctoralThesis -
658
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …”
Get full text
Get full text
Get full text
Get full text
article -
659
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
Get full text
Get full text
Get full text
article -
660
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…In fact, SAR is the only satellite-based technology able to detect buried artefacts from space, and it is expected that fine-resolution images of ALOS/PALSAR-2 (L-band SAR) would be able to detect large features (>1 m) that might be buried in the subsurface (<2 m) under optimum conditions, i.e., dry and bare soil. …”
Get full text