Search Results - (( concern validation learning algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- validation learning »
- concern validation »
- learning algorithm »
- java application »
-
1
Evaluating the Performance of a Visual Support System for Driving Assistance using a Deep Learning Algorithm
Published 2024“…The model utilises the YOLO V8 deep learning algorithm in the Google Colab environment and is trained using a custom dataset managed by the Roboflow dataset manager. …”
Get full text
Get full text
Get full text
Article -
2
Bot detection using machine learning algorithms on social media platforms
Published 2021“…Using bots in social media is a significant concern for information validity and authenticity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. Additionally, our analysis delves into machine learning techniques, discusses metrics and simulation tools to validate collision avoidance systems, and delineates local and global algorithmic perspectives. …”
Get full text
Get full text
Get full text
Article -
4
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
5
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…The SVM algorithm, a supervised learning model, plays a crucial role in improving the efficiency of tool selection, ultimately enhancing the speed and adaptability of vulnerability detection processes. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…Further, it focuses on the development of various forms of local risk prediction models and simple heart risk scores using non-laboratory features and machine learning (ML) algorithms. However, the conversion of a complex form of ML algorithms into a simple statistical model is the prime concern. …”
Get full text
Get full text
Thesis -
8
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
The Crop Price Prediction Using Machine Learning: Preliminary Stage
Published 2024“…The back-end predictive model for this project is created utilizing machine learning algorithms. The steps involved in creating a predictive model are data collecting, data cleaning, data mining, and validation. …”
Get full text
Get full text
Get full text
Article -
11
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…The validation of machine learning obtained 85.4% accuracy for 96,074 samples and 91.1% accuracy for 10,000 samples. …”
Get full text
Get full text
Thesis -
12
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…Ten case studies were conducted in this study to validate the predictive performance of the stochastic deep learning noise prediction model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
14
-
15
Detection of Corona Faults in Switchgear by Using 1D-CNN, LSTM, and 1D-CNN-LSTM Methods
Published 2024“…Recent years have seen the successful use of Deep Learning (DL) applications for corona and non-corona detection, owing to their autonomous feature learning capability. …”
Article -
16
Human hearing disorder recognition model using eeg-aep based signal
Published 2022“…Then, the extracted feature was classified using machine learning and deep learning algorithms. The performance of the proposed approach was validated using the experimental collected dataset (UMP-Emotiv-AEP) and well-known publicly available AEP datasets. …”
Get full text
Get full text
Thesis -
17
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
Get full text
Get full text
Get full text
Article -
18
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…Subsequently, comparative analysis to further establish the problems has been carried out via utilization of various existing algorithms which were then validated using three openly available datasets. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
CUCKOO SEARCH OPTIMIZATION NEURAL NETWORK MODELS FOR FORECASTING LONG-TERM PRECIPITATION
Published 2024“…Technological developments in metaheuristic algorithms have introduced a different method for downscaling. …”
Get full text
Get full text
Get full text
Book Chapter
