Showing 181 - 200 results of 51,339 for search 'learning (method OR methods)', query time: 0.31s Refine Results
  1. 181

    METHOD OF BUILDING THE SEMANTIC NETWORK OF DISTRIBUTED SEARCH IN E-LEARNING by Nina Kuchuk, Roman Artiukh, Artem Nechausov

    Published 2017-11-01
    “…Determining intensions and extensions allowed stratified semantic networks to be used for searching. Conclusions. The method of synthesizing a decision tree and a stratified semantic network is suggested; this method enables considering them as closely interrelated ones in the context of distributed search in e-learning. …”
    Get full text
    Article
  2. 182
  3. 183

    Optical fiber eavesdropping detection method based on machine learning by Xiaolian CHEN, Yi QIN, Jie ZHANG, Yajie LI, Haokun SONG, Huibin ZHANG

    Published 2020-11-01
    “…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
    Get full text
    Article
  4. 184

    A Graph Representation Learning-Based Method for Event Prediction by Xi Zeng, Guangchun Luo, Ke Qin, Pengyi Zheng

    Published 2025-01-01
    “…This paper proposes a novel event prediction method based on graph representation learning, aiming to improve the accuracy of event prediction while reducing the time cost. …”
    Get full text
    Article
  5. 185
  6. 186
  7. 187

    Backdoor defense method in federated learning based on contrastive training by Jiale ZHANG, Chengcheng ZHU, Xiang CHENG, Xiaobing SUN, Bing CHEN

    Published 2024-03-01
    “…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
    Get full text
    Article
  8. 188

    Method of accelerating deep learning with optimized distributed cache in containers by Kai ZHANG, Yang CHE

    Published 2021-09-01
    “…When using GPU to train deep learning models with large-scale dataset, the data loading and preprocessing stages often decrease overall performance notably.Lots of GPU computing resources are wasted on waiting for loading data from remote storage.Firstly, the methods of accelerating deep learning training with container and distributed cache were introduced.The architecture and initial optimization of such training system, which was implemented with Alluxio and Kubernetes, were introduced as well.Secondly, the task and data co-located scheduling (TDCS) and the colocated scheduling policy were elaborated.Thirdly, TDCS was implemented in Kubernetes cluster, which made the acceleration result more extensible.Finally, the result of training ResNet50 image classification model on 128 NVIDIAV100 GPU devices demonstrates that the proposed methods can bring 2 to 3 times speed up comparing with load data from remote storage directly.…”
    Get full text
    Article
  9. 189

    A Transfer Learning Method to Generate Synthetic Synoptic Magnetograms by Xiaoyue Li, Valliappan Senthamizh Pavai, Daria Shukhobodskaia, Mark D. Butala, Luciano Rodriguez, Jasmina Magdalenic, Véronique Delouille

    Published 2024-01-01
    “…Toward this goal, we develop a method called Transfer‐Solar‐GAN which combines a conditional generative adversarial network with a transfer learning approach to overcome training data set limitations. …”
    Get full text
    Article
  10. 190

    The Effect of The Mind Map Method on The Students’ Memory in Thematic Learning by Dea Amelia Harits, Mizaniya Mizaniya

    Published 2021-06-01
    “…The purpose of this study was to find out the influence of mind map method on the memory of learners in thematic learning in class IV MI Ma'arif NU 02 Tamansari. …”
    Get full text
    Article
  11. 191

    Helium Speech Recognition Method Based on Spectrogram with Deep Learning by Yonghong Chen, Shibing Zhang, Dongmei Li

    Published 2025-05-01
    “…This study introduces deep learning into helium speech recognition and proposes a spectrogram-based dual-model helium speech recognition method. …”
    Get full text
    Article
  12. 192

    Research on Apple Recognition and Localization Method Based on Deep Learning by Zhipeng Zhao, Chengkai Yin, Ziliang Guo, Jian Zhang, Qing Chen, Ziyuan Gu

    Published 2025-02-01
    “…This study proposes a fusion recognition method based on improved YOLOv7 for apple growth morphology classification and fruit position. …”
    Get full text
    Article
  13. 193
  14. 194

    Clothing classification method based on attention mechanism and transfer learning by CHEN Jinguang, HUANG Xiaoju, MA Lili

    Published 2024-06-01
    “…Aimed the low efficiency and low accuracy of clothing image classification, a clothing image classification method based on attention mechanism and transfer learning was proposed. …”
    Get full text
    Article
  15. 195

    FLWD:A Webshell detection method based on federated learning by ZENG Qingpeng, CHAI Jiangli, WU Shuixiu

    Published 2025-06-01
    “…To address these challenges, a Webshell detection method based on federated learning was proposed. The method integrated the abstract syntax tree node value sequence features, code structure features, text obfuscation features, and cybersecurity expertise and experience features of Webshells. …”
    Get full text
    Article
  16. 196

    A Survey of Grapheme-to-Phoneme Conversion Methods by Shiyang Cheng, Pengcheng Zhu, Jueting Liu, Zehua Wang

    Published 2024-12-01
    “…This paper provides a systematical overview of the G2P conversion from different perspectives. The conversion methods are first presented in the paper; detailed discussions are conducted on methods based on deep learning technology. …”
    Get full text
    Article
  17. 197

    METHODOLOGICAL BASES OF BLENDED LEARNING IN THE HIGHER EDUCATION by Olga Korotun

    Published 2016-11-01
    Subjects: “…blended learning; traditional learning; distance learning; methodological bases; principles…”
    Get full text
    Article
  18. 198
  19. 199

    Review of pedestrian trajectory prediction methods by Linhui LI, Bin ZHOU, Weiwei REN, Jing LIAN

    Published 2021-12-01
    “…With the breakthrough of deep learning technology and the proposal of large data sets, the accuracy of pedestrian trajectory prediction has become one of the research hotspots in the field of artificial intelligence.The technical classification and research status of pedestrian trajectory prediction were mainly reviewed.According to the different modeling methods, the existing methods were divided into shallow learning and deep learning based trajectory prediction algorithms, the advantages and disadvantages of representative algorithms in each type of method were analyzed and introduced.Then, the current mainstream public data sets were summarized, and the performance of mainstream trajectory prediction methods based on the data sets was compared.Finally, the challenges faced by the trajectory prediction technology and the development direction of future work were prospected.…”
    Get full text
    Article
  20. 200

    Comparing the effect of lecture method and cooperative teaching method on the learning, communication skills, and attitudes of students: a quasi-experimental study by Amin Beigzadeh, Hadi Bazyar, Hadi Bazyar, Mozhdeh Delzendeh, Mohammad Hassan Razmi, Nafiseh Sharifi

    Published 2024-12-01
    “…The objective of this study was to evaluate the effectiveness of the lecture method in comparison to the cooperative learning method, specifically focusing on students’ learning outcomes, communication skills, and attitudes.MethodsThis quasi-experimental interventional study was conducted at Sirjan School of Medical Sciences, Sirjan, Iran in 2023 involving a sample of 30 third-semester students. …”
    Get full text
    Article