Search alternatives:
augmentations » segmentations (Expand Search), fragmentations (Expand Search)
augmentation » segmentation (Expand Search), fragmentation (Expand Search)
augmentations » segmentations (Expand Search), fragmentations (Expand Search)
augmentation » segmentation (Expand Search), fragmentation (Expand Search)
-
1
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
-
2
K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation
Published 2022“…This paper introduces K Nearest Neighbor OveRsampling (KNNOR) Algorithm — a novel data augmentation technique that considers the distribution of data and takes into account the k nearest neighbors while generating artificial data points. …”
-
3
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
4
-
5
KNNOR: An oversampling technique for imbalanced datasets
Published 2021“…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
-
6
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021“…We show how our algorithm supports the definition of a budget for alignment computation and also augment it with strategies for meta-heuristic optimization and pruning of the search space. …”
Get full text
Get full text
Get full text
-
7
Towards Multimedia Fragmentation
Published 2006“…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
Published 2025“…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
-
10
-
11
-
12
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
13
-
14
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…A detailed analysis of the ML pipelines is provided, and the in-demand methods and algorithms are summarized in augmentative tables and figures. …”
Get full text
article -
15
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…In addition to anonymity and unlinkability characteristics, the proposed framework is augmented with traceability and non-repudiation features. …”
-
16
-
17
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…This research paper explores GAI in enhancing cybersecurity by leveraging AI Models and algorithms. GAI can autonomously address common security issues, detect novel threats, and augment human intervention in critical security aspects. …”
-
18
-
19
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
20
A multi-pretraining U-Net architecture for semantic segmentation
Published 2025“…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. …”