Search alternatives:
augmentation » fragmentation (Expand Search)
algorithms » algorithm (Expand Search)
augmentation » fragmentation (Expand Search)
algorithms » algorithm (Expand Search)
-
21
-
22
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
Published 2025“…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
-
23
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…The automatic segmentation algorithm is adopted to extract the region of interest, and subsequently morphological and texture features are computed. …”
-
24
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
Get full text
Get full text
Get full text
article -
25
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…A detailed analysis of the ML pipelines is provided, and the in-demand methods and algorithms are summarized in augmentative tables and figures. …”
Get full text
article -
26
Large-scale annotation dataset for fetal head biometry in ultrasound images
Published 2023“…For enhanced compatibility and usability, the dataset is available in 11 universally accepted formats, including Cityscapes, YOLO, CVAT, Datumaro, COCO, TFRecord, PASCAL, LabelMe, Segmentation mask, OpenImage, and ICDAR. This broad range of formats ensures adaptability for various computer vision tasks, such as classification, segmentation, and object detection. …”
-
27
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…In addition to anonymity and unlinkability characteristics, the proposed framework is augmented with traceability and non-repudiation features. …”
-
28
Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels
Published 2023“…<p dir="ltr">Although the effect of hyperparameters on algorithmic outputs is well known in machine learning, the effects of hyperparameters on information systems that produce user or customer segments are relatively unexplored. …”
-
29
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
30
-
31
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
-
32
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
-
33
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The road network is represented as a directed graph in which nodes are junctions (intersections) and edges are road segments. We assume that the city has deployed high-fidelity sensors for speed reading in a subset of edges; and the objective is to infer the speed readings for the remaining edges in the network; and to estimate the missing values in the segments for which sensors have stopped generating data due to technical problems (e.g., battery, network, etc.). …”
-
34
-
35
-
36
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
37
-
38
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
Published 2024“…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …”
-
39
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
40
A New Approach for Recognizing Saudi Arabian License Plates using Neural Networks
Published 2020“…The results obtained from a medium size data base are very promising, i.e., 98%. The alogoritms discussed here were tested at the entrance of a praking lot to mimic a real life situation.…”
Get full text
article