Search Results - (( java application optimization algorithm ) OR ( deep learning application algorithm ))
Search alternatives:
- application optimization »
- application algorithm »
- java application »
-
1
Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective
Published 2019“…In this paper, we present recent progress on the application of nature inspired algorithms in deep learning. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
-
3
Meta-heuristics and deep learning for energy applications: Review and open research challenges (2018?2023)
Published 2025Subjects:Review -
4
-
5
Deep learning methods for facial expression recognition
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024thesis::master thesis -
7
Performance of correlational filtering and deep learning based single target tracking algorithms / ZhongMing Liao and Azlan Ismail
Published 2023“…It has broken through many complex problems that are difficult to be solved by traditional algorithms. Therefore, reviewing the visual target tracking algorithms based on deep learning from different perspectives is important. …”
Get full text
Get full text
Get full text
Article -
8
Application of deep learning algorithms in lung sound classification: A systematic review since 2015
Published 2025“…The article’s thorough analysis revealed that deep learning algorithms have outperformed traditional machine learning techniques in lung sound classification.…”
Get full text
Get full text
Get full text
Get full text
Article -
9
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
-
12
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
14
Deep learning convolutional neural network algorithms for the early detection and diagnosis of dental caries on periapical radiographs: a systematic review
Published 2021“…Deep learning algorithms have broader and more profound layers and are continually being developed, remarkably enhancing their precision in detecting and segmenting objects. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A review of hybrid deep learning applications for streamflow forecasting
Published 2024Subjects:Review -
16
A review of object detection in traffic scenes based on deep learning
Published 2024“…This survey is based on the theory of deep learning. It systematically summarizes the Development and current research status of object detection algorithms, and compare the characteristics, advantages and disadvantages of the two types of algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Federated deep learning for automated detection of diabetic retinopathy
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…It discusses recent machine learning and deep learning work with various network implementations, applications, algorithms, learning approaches, and datasets to develop an operational intrusion detection system.…”
Get full text
Get full text
Get full text
Get full text
Article
