Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
data model » data models (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
data model » data models (Expand Search)
-
321
Dataset built for Arabic Sentiment Analysis
Published 2016“…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
Get full text
-
322
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
Published 2007“…Three years of data are used for model building and validation. …”
Get full text
article -
323
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
-
324
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …”
-
325
Cross entropy error function in neural networks
Published 2002“…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …”
Get full text
Get full text
Get full text
conferenceObject -
326
Computation of conformal invariants
Published 2020“…We compare the performance and accuracy to previous results in the cases when numerical data is available and also in the case of several model problems where exact results are available.…”
Get full text
Get full text
Get full text
article -
327
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
328
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…A model is proposed to identify the parameters of a class of stochastic nonlinearsystems. …”
Get full text
article -
329
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
Published 2013“…We use this algorithm to build a sensor selection model to choose among location sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
330
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
Get full text
Get full text
Get full text
article -
331
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
Published 2023“…It depends mainly on the actuating error signal, and it has a variable step size of the CMPN. The detailed modeling of the whole system is presented, including measured wind speed data, detailed switching techniques, a drive train model of the turbine, and real SMESD. …”
Get full text
Get full text
Get full text
article -
332
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
333
High-order parametrization of the hypergeometric-Meijer approximants
Published 2023“…We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …”
-
334
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
335
EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach
Published 2019“…Features extracted from the proposed BoDF model have considerably smaller dimensions. The proposed model achieves better classification accuracy compared to the recently reported work when validated on SJTU SEED and DEAP data sets. …”
-
336
-
337
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Therefore, the proposed work intends to implement a group of novel methodologies for developing an effective Cyborg intelligence security model to secure smart city systems. Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
-
338
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
-
339
Computation of conformal invariants
Published 2021“…We compare the performance and accuracy to previous results in the cases when numerical data is available and also in the case of several model problems where exact results are available.…”
-
340
Inferential sensing techniques in industrial applications
Published 0007“…Real data from a boiler plant is used to develop the model. …”
Get full text
masterThesis