Search alternatives:
learning algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
learning algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
-
361
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
362
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…In addition to the tertiary study, we also identified recent 112 deep learning-based sentiment analysis papers and categorized them based on the applied deep learning algorithms. …”
-
363
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We build our model using machine learning techniques in particular rule-based models. …”
Get full text
Get full text
masterThesis -
364
-
365
Predicting Android Malware Using Evolution Networks
Published 2025“…With this aim, we introduce evolutionary networks, and particularly the Susceptible-Infectious-Susceptible (SIS) model, as a way to address the limitations of previous studies which are typically based on traditional machine learning models. The SIS model is usually used to represent disease spread between individuals in a population with transition between susceptible and infected states. …”
Get full text
Get full text
Get full text
masterThesis -
366
Mining airline data for CRM strategies. (c2006)
Published 2006Get full text
Get full text
masterThesis -
367
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
-
368
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…<p dir="ltr">This research aims to enhance the safety level and crash resiliency of targeted woven roving glass/epoxy composite material for various industry 4.0 applications. Advanced machine learning algorithms are used in this study to figure out the complicated relationship between the crashworthiness parameters of the hexagonal composite ring specimens under lateral compressive, energy absorption, and failure modes. …”
-
369
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
Published 1997“…It is shown that the performance of FLPSS can be improved significantly by incorporating a genetic based learning mechanism. The performance of the proposed HPSS under different disturbances and loading conditions is investigated. …”
Get full text
Get full text
article -
370
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
371
-
372
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
-
373
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
374
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. …”
Get full text
Get full text
Get full text
masterThesis -
375
Unsupervised outlier detection in multidimensional data
Published 2022“…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
-
376
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…<p>Promoting healthy discourse on community-based online platforms like Reddit can be challenging, especially when conversations show ominous signs of toxicity. …”
-
377
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
378
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
Get full text
Get full text
Get full text
masterThesis -
379
Current trends and future orientation in diagnosing lung pathologies: A systematic survey
Published 2025“…The CV processing method involves the application of advanced imaging techniques and machine learning algorithms to scrutinize and diagnose lung pathologies and ventilator-associated pneumonia (VAP). …”
Get full text
Get full text
Get full text
article -
380
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article