Search Results - solution ((((validation technique) OR (computing techniques))) OR (learning techniques))
Search alternatives:
- validation technique »
- computing techniques »
-
1
Optimization and design of machine learning computational technique for prediction of physical separation process
Published 2022“…Indeed, this work indicates application of machine learning technique for a real physical system and optimization of process parameters to achieve the target. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
Menyemak Jawapan Soalan Subjektif Menggunakan Pendekatan Pemprosesan Bahasa Tabii
Published 2006“…The learning system in this study utilizes the natural language processing technique in order to receive subjective answers from the users. …”
Get full text
Get full text
Get full text
Thesis -
3
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The deep learning (DL) techniques has been used recently for enhanced OT intrusion detection performances.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
5
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…The findings empirically support the validation of the Q-Learning model improvement for high-volume IoT resource discovery cases. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Breast Cancer Detection by Hybrid Techniques based on Deep Learning Networks
Published 2021“…Lastly, k-fold cross-validation techniques were executed to validate the results and obtained the average reading for both training and testing datasets. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
Published 2013“…Therefore, lightweight techniques are imperative for the processing of computational intensive applications in MCC. …”
Get full text
Get full text
Thesis -
10
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025“…Future work will focus on exploring additional feature selection methods, integrating deep learning techniques, and validating the models in real-world IoT environments.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Enhancing phishing detection with advanced ensemble learning techniques
Published 2025“…This study introduces an advanced phishing detection model that leverages ensemble learning techniques to improve accuracy, robustness, and adaptability. …”
Get full text
Get full text
Article -
12
Sustainability model for rural telecenter using business intelligence technique
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A high-performance neural network algorithm using a Legendre ensemble-based extreme learning machine for solving fractional partial differential equations
Published 2025“…The recent advancement in the use of machine learning techniques across various fields has paved the way for innovative approaches to solving fractional partial differential equations (FPDEs), particularly those utilizing neural networks (NNs). …”
Get full text
Get full text
Get full text
Article -
14
-
15
Deep learning based fuzzy-MPC controller for satellite combined energy and attitude control system
Published 2024“…Therefore, the novel Deep-Learning solution provides a feasible platform for applying more complicated and sophisticated attitude control techniques for the CEACS attitude regulation in small satellites as an example. © 2024 COSPAR…”
Get full text
Get full text
Get full text
Article -
16
Malicious URL classification using artificial fish swarm optimization and deep learning
Published 2023“…The proposed AFSADL-MURLC technique was experimentally validated using benchmark dataset sourced from Kaggle repository. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Bot detection using machine learning algorithms on social media platforms
Published 2021“…The research uses the bot detection technique based on machine learning algorithms. The components of the study are data, feature selection, and bot detection. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Enhanced Conditional Generative Adversarial Network For Handling Subject Variability In Human Activity Recognition
Published 2023“…Elderly and adult datasets were used to evaluate the assessment techniques. Experiments on adult dataset only, experiments on elderly dataset only, and experiments on adult (as training) and elderly (as test) datasets were conducted using machine learning and deep learning. …”
Get full text
Get full text
Thesis -
19
MACHINE LEARNING-BASED PREDICTIVE MODEL FOR FUTURE SAVINGS: ANALYZING MONTHLY CONSUMPTION AND EARNINGS
Published 2024“…This project aims to address key challenges in the contemporary financial landscape by leveraging AI and ML techniques to provide innovative solutions for financial planning and decision-making. …”
Get full text
Get full text
Final Year Project -
20
A review on optimization of least squares support vector machine for time series forecasting
Published 2016“…This paper presents a review on techniques used to optimize the parameters based on two main classes; Evolutionary Computation and Cross Validation.…”
Get full text
Get full text
Get full text
Article
