Search alternatives:
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
-
61
Web Based Online Hybrid Teaching Method of Network Music Course
Published 2022“…Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …”
Get full text
-
62
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…Some user parameters are included in the objective function and are architecture- or problem-dependent parameters. The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …”
Get full text
Get full text
Get full text
article -
63
Physical optimization algorithms for mapping data to distributed-memory multiprocessors
Published 1992“…We present three parallel physical optimization algorithms for mapping data to distributed-memory multiprocessors, concentrating on irregular loosely synchronous problems. …”
Get full text
Get full text
Get full text
masterThesis -
64
General applicability of genetic and simulated annealing algorithms for data mapping
Published 1995Get full text
Get full text
Get full text
conferenceObject -
65
-
66
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…We demonstrated the applicability of feature engineering techniques such as data imputation, transformation (e.g., scaling, centering, etc.), and data balancing using several case studies and the proposed semi-automated framework. …”
-
67
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
-
68
Stability improvement of the PSS-connected power system network with ensemble machine learning tool
Published 2022Subjects: -
69
Leveraging Machine and Deep Learning Algorithms for hERG Blocker Prediction
Published 2025Subjects: -
70
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…We use an ant colony optimization algorithm in the adaptation process. …”
Get full text
Get full text
Get full text
article -
71
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
Published 2023“…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …”
-
72
-
73
-
74
Learning control algorithms for tracking "slowly" varying trajectories
Published 1997“…For applications where the desired outputs are assumed to change "slowly", we present a D-type, PD-type, and PID-type learning algorithms. At each iteration we assume that the system outputs and desired trajectories are contaminated with measurement noise, the system state contains disturbances, and errors are present during reinitialization. …”
Get full text
Get full text
Get full text
Get full text
article -
75
A comparison of data mapping algorithms for parallel iterative PDE solvers
Published 1995“…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …”
Get full text
Get full text
Get full text
article -
76
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
Get full text
Get full text
Get full text
Get full text
article -
77
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
Published 2021“…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …”
Get full text
article -
78
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
Published 2022“…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
Get full text
Get full text
Get full text
masterThesis -
79
Selection of the learning gain matrix of an iterative learning control algorithm in presence of measurement noise
Published 2005“…This work also provides a recursive algorithm that generates the appropriate learning gain functions that meet the arbitrary high precision output tracking objective. …”
Get full text
Get full text
Get full text
Get full text
article -
80
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”