Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 4
- Research 3
- Study and teaching 3
- Education 2
- Law 2
- Social sciences 2
- ART / Digital 1
- Advertising 1
- Biotechnology 1
- Business communication 1
- Chemistry Techniques, Analytical 1
- Clinical psychology 1
- Comparative method 1
- Computer animation 1
- Consumer Behavior 1
- Cross-cultural studies 1
- Digital cinematography 1
- Drinking Behavior 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Ethnology 1
- Experimental methods 1
-
181
METHOD OF BUILDING THE SEMANTIC NETWORK OF DISTRIBUTED SEARCH IN E-LEARNING
Published 2017-11-01“…Determining intensions and extensions allowed stratified semantic networks to be used for searching. Conclusions. The method of synthesizing a decision tree and a stratified semantic network is suggested; this method enables considering them as closely interrelated ones in the context of distributed search in e-learning. …”
Get full text
Article -
182
Contrastive learning method for leak detection in water distribution networks
Published 2024-11-01Get full text
Article -
183
Optical fiber eavesdropping detection method based on machine learning
Published 2020-11-01“…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
Get full text
Article -
184
A Graph Representation Learning-Based Method for Event Prediction
Published 2025-01-01“…This paper proposes a novel event prediction method based on graph representation learning, aiming to improve the accuracy of event prediction while reducing the time cost. …”
Get full text
Article -
185
Implementation of the Drill Method in Learning Arabic with a Communicative Approach
Published 2023-06-01Subjects: “…drill method…”
Get full text
Article -
186
Implementation of Inquiry Learning Method in Maharah al-Qiro'ah
Published 2023-11-01Subjects: Get full text
Article -
187
Backdoor defense method in federated learning based on contrastive training
Published 2024-03-01“…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
Get full text
Article -
188
Method of accelerating deep learning with optimized distributed cache in containers
Published 2021-09-01“…When using GPU to train deep learning models with large-scale dataset, the data loading and preprocessing stages often decrease overall performance notably.Lots of GPU computing resources are wasted on waiting for loading data from remote storage.Firstly, the methods of accelerating deep learning training with container and distributed cache were introduced.The architecture and initial optimization of such training system, which was implemented with Alluxio and Kubernetes, were introduced as well.Secondly, the task and data co-located scheduling (TDCS) and the colocated scheduling policy were elaborated.Thirdly, TDCS was implemented in Kubernetes cluster, which made the acceleration result more extensible.Finally, the result of training ResNet50 image classification model on 128 NVIDIAV100 GPU devices demonstrates that the proposed methods can bring 2 to 3 times speed up comparing with load data from remote storage directly.…”
Get full text
Article -
189
A Transfer Learning Method to Generate Synthetic Synoptic Magnetograms
Published 2024-01-01“…Toward this goal, we develop a method called Transfer‐Solar‐GAN which combines a conditional generative adversarial network with a transfer learning approach to overcome training data set limitations. …”
Get full text
Article -
190
The Effect of The Mind Map Method on The Students’ Memory in Thematic Learning
Published 2021-06-01“…The purpose of this study was to find out the influence of mind map method on the memory of learners in thematic learning in class IV MI Ma'arif NU 02 Tamansari. …”
Get full text
Article -
191
Helium Speech Recognition Method Based on Spectrogram with Deep Learning
Published 2025-05-01“…This study introduces deep learning into helium speech recognition and proposes a spectrogram-based dual-model helium speech recognition method. …”
Get full text
Article -
192
Research on Apple Recognition and Localization Method Based on Deep Learning
Published 2025-02-01“…This study proposes a fusion recognition method based on improved YOLOv7 for apple growth morphology classification and fruit position. …”
Get full text
Article -
193
Deep Learning Method for Classifying Items into Categories for Dutch Auctions
Published 2024-01-01Get full text
Article -
194
Clothing classification method based on attention mechanism and transfer learning
Published 2024-06-01“…Aimed the low efficiency and low accuracy of clothing image classification, a clothing image classification method based on attention mechanism and transfer learning was proposed. …”
Get full text
Article -
195
FLWD:A Webshell detection method based on federated learning
Published 2025-06-01“…To address these challenges, a Webshell detection method based on federated learning was proposed. The method integrated the abstract syntax tree node value sequence features, code structure features, text obfuscation features, and cybersecurity expertise and experience features of Webshells. …”
Get full text
Article -
196
A Survey of Grapheme-to-Phoneme Conversion Methods
Published 2024-12-01“…This paper provides a systematical overview of the G2P conversion from different perspectives. The conversion methods are first presented in the paper; detailed discussions are conducted on methods based on deep learning technology. …”
Get full text
Article -
197
METHODOLOGICAL BASES OF BLENDED LEARNING IN THE HIGHER EDUCATION
Published 2016-11-01Subjects: “…blended learning; traditional learning; distance learning; methodological bases; principles…”
Get full text
Article -
198
Modern vs Traditional: Comparative Study of Efficacious Arabic Language Learning Methods
Published 2024-06-01Subjects: Get full text
Article -
199
Review of pedestrian trajectory prediction methods
Published 2021-12-01“…With the breakthrough of deep learning technology and the proposal of large data sets, the accuracy of pedestrian trajectory prediction has become one of the research hotspots in the field of artificial intelligence.The technical classification and research status of pedestrian trajectory prediction were mainly reviewed.According to the different modeling methods, the existing methods were divided into shallow learning and deep learning based trajectory prediction algorithms, the advantages and disadvantages of representative algorithms in each type of method were analyzed and introduced.Then, the current mainstream public data sets were summarized, and the performance of mainstream trajectory prediction methods based on the data sets was compared.Finally, the challenges faced by the trajectory prediction technology and the development direction of future work were prospected.…”
Get full text
Article -
200
Comparing the effect of lecture method and cooperative teaching method on the learning, communication skills, and attitudes of students: a quasi-experimental study
Published 2024-12-01“…The objective of this study was to evaluate the effectiveness of the lecture method in comparison to the cooperative learning method, specifically focusing on students’ learning outcomes, communication skills, and attitudes.MethodsThis quasi-experimental interventional study was conducted at Sirjan School of Medical Sciences, Sirjan, Iran in 2023 involving a sample of 30 third-semester students. …”
Get full text
Article