Search alternatives:
vector » sector (Expand Search)
Showing 721 - 740 results of 1,249 for search 'work vector model', query time: 0.12s Refine Results
  1. 721

    Generative Adversarial Networks for Dynamic Cybersecurity Threat Detection and Mitigation by William Villegas-Ch, Rommel Gutierrez, Jaime Govea

    Published 2025-04-01
    “…The increasing complexity and dynamism of cyberattacks, such as ransomware, phishing, and denial of service, demand advanced solutions that overcome the limitations of traditional methods, such as support vector machines and decision trees. This study proposes a generative adversarial network (GAN)-based model to enhance the detection and mitigation of dynamic cybersecurity threats by improving adaptability and robustness in real-time scenarios. …”
    Get full text
    Article
  2. 722

    A clinical data-driven machine learning approach for predicting the effectiveness of piperacillin-tazobactam in treating lower respiratory tract infections by Yemeng Yang, Kun Han, Jiatao Li, Tao Zhang, Zhijing Zhu, Ling Su, Zhaoyong Han, Chunyan Xu, Yi Lu, Likun Pan, Tao Yang

    Published 2025-03-01
    “…Following data preprocessing, we trained four models: Logistic Regression, Random Forest, Support Vector Machine, and Gaussian Naive Bayes. …”
    Get full text
    Article
  3. 723

    AI-based Personalization of Social Media Thumbnails Using the Stacked ID Embedding Method by Meivi Kartikasari, Hashfi Andira Putra, Mukhlis Amien

    Published 2025-07-01
    “…The findings show the promise of AI-driven tools in enabling the democratization of design tasks for social media content creators, as well as suggesting future work in model fine-tuning for more domain-specific outcome. …”
    Get full text
    Article
  4. 724

    Improving network security using keyboard dynamics: A comparative study by Ugwunna, C.O., Chukwuogo, O.E., Alabi, O.A., Kareem, M.K., Belonwu, T.S., Oloyede, S.O.

    Published 2023-12-01
    “…To provide an accurate verification of whether a user is authentic or fraudulent, a model that integrates machine learning and dynamic keystroke models—Decision Tree, Random Forest, Support Vector Machine, and K-nearest Neighbors—is compared and utilized. …”
    Get full text
    Article
  5. 725

    Multi-Modal Feature Set-Based Detection of Freezing of Gait in Parkinson’s Disease Patients Using SVM by Ghulam Murtaza, Mohammed Hammoud, Andrey Somov

    Published 2025-01-01
    “…Then, time-, frequency-, and time-frequency-based features were extracted and fed to the Support Vector Machine (SVM) model. These features included statistical, wavelet transform-based Shannon entropy, and Fast Fourier transform-based features. …”
    Get full text
    Article
  6. 726

    Application of machine learning techniques for churn prediction in the telecom business by Raji Krishna, D. Jayanthi, D.S. Shylu Sam, K. Kavitha, Naveen Kumar Maurya, T. Benil

    Published 2024-12-01
    “…The primary objective of this work is to examine various machine learning algorithms necessary for creating customer churn prediction (CP) models and identifying the reasons for churn. …”
    Get full text
    Article
  7. 727

    A Fast True Time-Delay Wideband Multi-Beam Beamforming Algorithm Based on a 16-Beam Approximate-DVM by Sirani M. Perera, Levi Lingsch, Alp Tuztas, Arjuna Madanayake

    Published 2025-01-01
    “…More precisely, we present a recursive algorithm to compute the DVM-vector product with a complexity reduction of at least 21% to at most 52% compared to our most recent work, and at least 39% to at most 98% compared to the brute-force DVM-vector calculation. …”
    Get full text
    Article
  8. 728

    Intelligent Data Processing Methods for the Atypical Values Correction of Stock Quotes by T. V. Zolotova, D. A. Volkova

    Published 2022-05-01
    “…For the initial data used in the work, the best result was shown by the implementation of the multiple imputation algorithm based on the detected outliers by the support vector method.Conclusion. …”
    Get full text
    Article
  9. 729

    LP-HENN: fully homomorphic encryption accelerator with high energy efficiency by Zhuoyu Tian, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang

    Published 2025-05-01
    “…LP-HENN leverages the collaborative work of the vector processor and ReRAM crossbars, employing optimization strategies to achieve full pipelining and minimize memory access. …”
    Get full text
    Article
  10. 730

    StomachNet: Optimal Deep Learning Features Fusion for Stomach Abnormalities Classification by Muhammad Attique Khan, Muhammad Shahzad Sarfraz, Majed Alhaisoni, Abdulaziz A. Albesher, Shuihua Wang, Imran Ashraf

    Published 2020-01-01
    “…A fully automated design is proposed in this work employing optimal deep learning features for classifying gastrointestinal infections. …”
    Get full text
    Article
  11. 731

    Evaluating Supervised Learning Classifier Performance for OFDM Communication in AWGN-Impacted Systems by Lavanya Vaishnavi D A, Anil Kumar C

    Published 2025-06-01
    “…SVM outperformed others with better power efficiency (PAPR 9.3–10.56) and PSNR (14.0–25.6), making it ideal for moderate noise environments. The model is adaptable to Free Space Optics and mmWave systems and supports future work in unsupervised and hybrid ML models.…”
    Get full text
    Article
  12. 732

    Adoption of K-means clustering algorithm in smart city security analysis and mythical experience analysis of urban image. by Haotong Han

    Published 2025-01-01
    “…<h4>Conclusion</h4>The algorithm model constructed in this work is capable of effectively evaluating the information security risks of SCs and has practical value. …”
    Get full text
    Article
  13. 733

    Increased Virulence of <i>Culicoides</i> Midge Cell-Derived Bluetongue Virus in IFNAR Mice by Barbara S. Drolet, Lindsey Reister-Hendricks, Christie Mayo, Case Rodgers, David C. Molik, David Scott McVey

    Published 2024-09-01
    “…Using the IFNAR BTV murine model, we compared the virulence of traditional BHK cell-derived BTV-17 with <i>C. sonorensis</i> midge (W8) cell-derived BTV-17 to determine whether using cells of the transmission vector would provide an in vitro virulence aspect of vector-transmitted virus. …”
    Get full text
    Article
  14. 734

    Bounded Degradation in Latent Representation Under Bias Subspace Removal by Md Nur Amin, Phil Nemeth, Alexander Jesser

    Published 2025-05-01
    “… This work investigates the concentration of demo- graphic signals in high-dimensional embeddings, focusing on a “bias subspace” that encodes sensitive at- tributes such as gender. …”
    Get full text
    Article
  15. 735

    Siamese Network-Based Feature Transformation for Improved Automated Epileptic Seizure Detection by Tayebeh Iloon, Ramin Barati, Hamid Azad

    Published 2022-01-01
    “…Since correctly diagnosing epilepsy seizures by monitoring the EEG signal is very tedious and time-consuming for a neurologist, a growing number of studies have been conducted on developing automated epileptic seizure detection (AESD). In this work, a novel supervised model is proposed for AESD. …”
    Get full text
    Article
  16. 736

    Development of a functional system for diagnosing the presence of rotor damage in induction traction motors by Denys Lakusta, Sergey Maliuk

    Published 2024-12-01
    “… The aim of this work is to develop a system for functional diagnostics of rotor bar breakage in induction traction motors of railway rolling stock. …”
    Get full text
    Article
  17. 737

    A Method for Designing Fault Diagnosis Filters for LPV Polytopic Systems by Sylvain Grenaille, David Henry, Ali Zolghadri

    Published 2008-01-01
    “…The work presented in this paper focuses on the design of robust Fault Detection and Isolation (FDI) filters for dynamic systems characterized by LPV (Linear Parameter Varying) polytopic models. …”
    Get full text
    Article
  18. 738

    Mentoring as a Means of Developing Self-Organization Skills in First-Year Military Students of Education Organizations under the Ministry of Internal Affairs of the Russian Federa... by Evgeny Yu. Ivanov

    Published 2025-02-01
    “…The research idea was to design a model for developing self-organization skills in first-year military students through mentoring. …”
    Article
  19. 739

    Diabetic Retinopathy Detection Using DL-Based Feature Extraction and a Hybrid Attention-Based Stacking Ensemble by Sanjana Rajeshwar, Shreya Thaplyal, Anbarasi M., Siva Shanmugam G.

    Published 2025-01-01
    “…Our work proposed a hybrid attention-based stacking ensemble with the mentioned models in the base layer and logistic regression model as meta layer, which further enhanced accuracy. …”
    Get full text
    Article
  20. 740

    Leveraging LIME for Trustworthy Apple Quality Assessment by İsmail Kırbaş, Ahmet Çifci

    Published 2025-06-01
    “…This study explores the integration of machine learning (ML) models and explainable artificial ıntelligence (XAI) techniques to enhance the accuracy and transparency of apple quality assessment. …”
    Get full text
    Article