يعرض 81 - 100 نتائج من 209 نتيجة بحث عن '(( experiments used algorithm ) OR ((( complement rd algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 81

    LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH حسب A. Masurkar, Faeez

    منشور في 2021
    "…The lamb wave signals for interrogating the plate structure are obtained using experiments and a sparse array of four piezoelectric wafer (PW) transducers. …"
    احصل على النص الكامل
  2. 82
  3. 83
  4. 84
  5. 85
  6. 86

    StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features حسب Muhammad Arif (769250)

    منشور في 2024
    "…Thus, the shortcomings of wet lab experiments are leveraged by computational methods to accurately predict the functional types of DPs. …"
  7. 87

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
    احصل على النص الكامل
  8. 88
  9. 89

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining حسب Koen Schaaf (14778139)

    منشور في 2021
    "…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …"
  10. 90
  11. 91

    An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study حسب Ayman Hassan (14426412)

    منشور في 2024
    "…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. …"
  12. 92

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  13. 93

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…All the experiments were conducted using the pitch-catch method in presence of surface damages on head of the Rail track. …"
    احصل على النص الكامل
  14. 94
  15. 95
  16. 96

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
  17. 97

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques حسب Joao Palotti (8479842)

    منشور في 2019
    "…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …"
  18. 98
  19. 99

    A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System حسب Ekinci, Serdar

    منشور في 2023
    "…CEC2019 test suite is also used to perform ablation experiments to reveal the separate contributions of chaotic local search and modified opposition-based learning strategies to the CmOBL-AO algorithm. …"
    احصل على النص الكامل
  20. 100