يعرض 61 - 80 نتائج من 118 نتيجة بحث عن '(( implement learning algorithm ) OR ((( element data algorithm ) OR ( element g algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 61
  2. 62

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 63

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features حسب Mariam Bahameish (19255789)

    منشور في 2024
    "…This study employed supervised learning algorithms to classify stress and relaxation states using HRV measures. …"
  4. 64

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review حسب Asma Alamgir (18288895)

    منشور في 2021
    "…There is a need for more reviews to learn the obstacles to the implementation of AI technologies in clinical settings. …"
  5. 65
  6. 66

    A novel few shot learning derived architecture for long-term HbA1c prediction حسب Marwa Qaraqe (10135172)

    منشور في 2024
    "…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…"
  7. 67

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios حسب Hasan Abbas Al-Mohammed (16810674)

    منشور في 2021
    "…In addition, an implementation scenario for securing IoT communications for sensors deployed in railroad networks is described. …"
  8. 68

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  9. 69

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle حسب Reza Jafari (3494018)

    منشور في 2025
    "…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …"
  10. 70

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  11. 71

    The automation of the development of classification models and improvement of model quality using feature engineering techniques حسب Sjoerd Boeschoten (17347045)

    منشور في 2023
    "…The proposed framework is extendable and configurable by adding algorithms supported by the CARET package implemented in the R programming language. …"
  12. 72
  13. 73

    Boosting the visibility of services in microservice architecture حسب Ahmet Vedat Tokmak (17773479)

    منشور في 2023
    "…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"
  14. 74

    Correlation Clustering with Overlaps حسب Fakhereldine, Amin

    منشور في 2020
    "…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 75

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…This SDN-ML-IoT uses a Machine Learning (ML) method in a Software-Defined Networking (SDN) environment in order to protect smart home IoT devices from DDoS attacks. …"
  16. 76

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
  17. 77
  18. 78

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …"
    احصل على النص الكامل
  19. 79
  20. 80

    Toward automatic motivator selection for autism behavior intervention therapy حسب Siyam, Nur

    منشور في 2022
    "…The states, actions and rewards design consider the factors that impact the efectiveness of a motivator based on applied behavior analysis as well as learners’ individual preferences. We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …"
    احصل على النص الكامل
    احصل على النص الكامل