Search alternatives:
training algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
based training » based learning (Expand Search)
training algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
based training » based learning (Expand Search)
-
61
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …”
-
62
-
63
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
Get full text
-
64
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
-
65
-
66
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
-
67
-
68
-
69
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. …”
-
70
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
71
-
72
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
73
Indoor Localization Based on Floor Plans and Power Maps
Published 2015“…An indoor localization algorithm that is based on fingerprinting and trilateration is developed. …”
Get full text
Get full text
Get full text
conferenceObject -
74
-
75
-
76
-
77
DRL-Based IRS-Assisted Secure Visible Light Communications
Published 2022“…The DDPG-based algorithm provides an optimized solution that can adapt to the large size of design parameters and act fast to the channel variations due to users’ mobility. …”
-
78
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
79
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
Published 2023“…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
-
80
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”