44 results
Search Results
2. A survey of cryptographic algorithms with deep learning.
- Author
-
Al-Zamily, Jawad Yousef Ibrahim, Ariffin, Syaiba Balqish, and Abu Naser, Samy Saleem Mahmoud
- Subjects
MACHINE learning ,DEEP learning ,UNITS of time ,ALGORITHMS - Abstract
In multimedia content, text play major role for transmission and it is crucial to protect text data while transmitting over network. This can be achieved by text encryption algorithm. However, the method relies on many resources that increase the processing unit time, memory, and battery power. There are so many different techniques should be used to protect confidential text from unauthorized access. This paper summarizes on the existing works which used different techniques for text encryption by using deep learning algorithms. Combination of these approaches helps to analyze different algorithms for different text, accelerates the processing time while maintaining accurate preservation and retrieval. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. A comparison of machine learning methods on intrusion detection systems for internet of things.
- Author
-
Widodo, Anteng, Warsito, Budi, and Wibowo, Adi
- Subjects
INTERNET of things ,MACHINE learning ,RANDOM forest algorithms ,DECISION trees ,INTRUSION detection systems (Computer security) ,ALGORITHMS - Abstract
In recent years, the internet of things is prevalent and widely used. The new problem with IoT is security, which needs to be considered carefully because of the technology heterogeneity. These threats can affect IoT performance; therefore, it is necessary for effective monitoring. This paper examines several machine learning methods in intrusion detection systems that possibly run on IoT. Random Forests and Decision Tree are employed in this study for performance comparison. The experimental results show that the Random Forest and Decision tree algorithms application produces good performance with a faster response time and possible running on IoT. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Data understanding and preparation in business domain: Importance of meta-features characterization.
- Author
-
Oreški, Dijana and Pihir, Igor
- Subjects
- *
MACHINE learning , *ALGORITHMS , *DEEP learning , *EXPERTISE - Abstract
Various machine learning algorithms are developed with an aim to create precise and trustworthy models and extract knowledge from data sources. Deep expertise in the field of machine learning is required for the challenging task of choosing the right algorithms for a specific dataset. There is no single algorithm that outperforms all others across all applications and different datasets. The difficulty of choosing an appropriate algorithm for a specific task in specific domain is related to the properties of the dataset. Properties of the dataset are measured through meta-features. Meta-features describe task and can provide explanation how one machine learning approach outperforms other algorithms on a given dataset. Learning about the effectiveness of learning algorithms, or meta-learning was developed to deal with this issue. Focus is required because previous research papers have not successfully identified meta-features in particular domains. In this research, we have evaluated various meta-feature characterization methodologies and have concentrated on basic meta-features. Business domain data is in the focus of this paper. We computed basic (general) meta-features and illustrated several use cases for their applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. A modified fuzzy K-nearest neighbor using sine cosine algorithm for two-classes and multi-classes datasets.
- Author
-
Zheng, Chengfeng, Kasihmuddin, Mohd Shareduwan Mohd, Mansor, Mohd. Asyraf, Jamaludin, Siti Zulaikha Mohd, and Zamri, Nur Ezlin
- Subjects
- *
K-nearest neighbor classification , *MACHINE learning , *ALGORITHMS , *COSINE function - Abstract
The sine and cosine algorithm has become a widely researched swarm optimization method in recent years due to its simplicity and effectiveness. Based on the advantages, the study in this paper delves deeper into the key parameters that influence the performance of the algorithm, and has implemented modifications such as integrating the reverse learning algorithm and adding elite opposition solution to create the modified Sine and Cosine Algorithm (the modified SCA). Furthermore, by combining the fuzzy k-nearest neighbor method with the modified SCA, the study simulates numeric datasets with two or multiple classes, and analyzes the results. The accuracy rate (ACC) achieved by the modified SCA FKNN in this paper is compared to other models, with data comparison results and tables presented for each. The modified SCA FKNN proposed in this paper has obvious advantages on accuracy rate(ACC). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Comparative analysis of algorithms used for Twitter spam drift detection.
- Author
-
Thomas, Libina, Nirvinda, Mona, Mounika, Lalitha, and Hulipalled, Vishwanath
- Subjects
- *
SPAM email , *ALGORITHMS , *COMPARATIVE studies , *SOCIAL networks , *SOCIAL interaction , *MACHINE learning - Abstract
Twitter is known to be one of the familiar social networking platform these days, among many others, with a lot of user engagement. This microblogging site encourages social interactions, allowing users to stay up to date on the latest news and events and share them with others in real time. Tweets are limited to 280 characters and is allowed to include links to related websites and tools. With a platform having such wide reach, it is prone to be targeted negatively and spams are one way to do it. Spammers use this platform to display malicious content that is inappropriate and harmful to users worldwide. Machine Learning uses various approaches that can be used to detect spam and overcome it. However, with the advent of recent technologies it has been observed that the properties of tweets vary overtime making it difficult to detect spam leading to the "Twitter Spam Drift" problem. This paper reviews the papers published since 2018 that have focused on the spam drift problem and gives a comparative analysis of the different algorithms that are utilized on the various data sets to tackle such a problem. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. A study of tools, techniques and language for the implementation of algorithm for brain tumor detection.
- Author
-
Agarwal, Sunil Kumar and Gupta, Yogesh Kumar
- Subjects
- *
BRAIN tumors , *MACHINE learning , *DEEP learning , *ALGORITHMS , *DEATH rate , *NEUROLINGUISTICS - Abstract
In their highest grade, brain tumors are the most widespread and dangerous diseases with a very short life span. Therefore, early automatic brain tumor detection is required to lower the fatality rate. Due to this, MRI is a commonly used imaging technology for diagnosis; however, it is practically impossible to do manual segmentation of the volume of data generated by MRI promptly. This paper is intended to analyze the suitable tools, techniques and language for automatic detection of Brain Tumor. From the nature of the problem, it is quite evident that it requires high precision of accuracy in detecting such a deadly disease in a very short period and if possible, in real-time, for a large number of datasets will be required not only to train the algorithm but also for its testing. Spark is an open-source platform to deal with lots of data. Spark's API, PySpark is coupled with Python language to enable the developers to develop a python script for the Spark processing engine. Deep learning algorithms are the most useful and appropriate for such types of tasks where a large amount of data is involved and requires high precision training and testing of the models and the algorithms. In this paper, we have discussed the selection of the tools, techniques and language for the implementation of the model for detecting the brain tumor. Tools like Google Colab and PySpark have been explored in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. Classification of meal waste from innovative trash data using random forest by comparing support vector machine algorithm for obtaining better accuracy.
- Author
-
Sampath, G. Sai and Saravanan, M. S.
- Subjects
- *
WASTE management , *SUPPORT vector machines , *RANDOM forest algorithms , *MACHINE learning , *IMAGE recognition (Computer vision) , *ALGORITHMS , *MEALS , *CHESTNUT - Abstract
The main objective of this paper is to improve the accuracy for automatic classification of meal waste from innovative trash data with the help of image processing. There are 2572 images for the classification of meal waste were used for this paper. The images are labeled as "Cardboard", "Plastic", "Paper", "Metal", "Glass", "Trash" and there are 20 number of images have been used for RF classifier taken as first set of machine learning algorithm and is compared with SVM algorithm taken as second set of machine learning algorithm With a g-power value of 80%, the revolutionary garbage data images, a threshold of 0.05%, a confidence interval of 95%, and a standard deviation, these photographs were gathered from various web sources. When compared to the SVM method, which had an accuracy of 61.45%, the proposed system's accuracy was enhanced to 84.81%, with a significant value of 0.001 (p 0.05) with a 95% confidence interval. This study found the meal waste from trash using the RF is significantly better than SVM algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Prediction of volume loss of reinforced polytetrafluoroethylene matrix composites using machine learning algorithms.
- Author
-
Ibrahim, M. A., Gidado, A. Y., Auwal, S. T., Kunya, B. I., Nura, M., and Jacqueline, L.
- Subjects
- *
MACHINE learning , *STANDARD deviations , *PARTICLE swarm optimization , *POLYTEF , *ALGORITHMS - Abstract
Machine learning (ML) algorithms are getting unsurpassed exposure as a potential technique for solving and modelling the wear behaviour of polymer matrix composites (PMCs). This paper presents the application of ML algorithms in predicting volume loss of reinforced polytetrafluoroethylene (PTFE) matrix composites. Firstly, the Taguchi L27 was harnessed to generate data set in a regulated way. Then multi linear regression (MLR), support vector regression (SVR), particle swarm optimization (PSO) and Harris Hawk's optimization (HHO) coupled with SVR ML algorithms were developed to accurately predict the volume loss of reinforced PTFE matrix composites. Based on the results achieved, it was found that SVR-HHO ML algorithm predicted the volume loss of reinforced PTFE matrix composites better than the other algorithms with determination coefficient (96 %) and root mean square error of 11 %. The ML algorithms could be used for prediction of volume loss of reinforced PTFE matrix composites and development of new PMCs with specific volume loss resistance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. The enhancement of quantum machine learning models via quantum Fourier transform in near-term applications.
- Author
-
Payares, Esteban and Martínez, Juan Carlos
- Subjects
MACHINE learning ,FOURIER transforms ,QUANTUM computers ,PYTHON programming language ,QUANTUM computing ,QUANTUM information science ,ALGORITHMS - Abstract
Quantum computers are here, and the search for applications and use of these allow us to overcome the limits that today's hardware information processing gives us is constantly going on. Quantum machine learning is one of the many emerging fields that use quantum computers to process information. In this paper, we present a method and a set of experiments where we see the potential and capacity of the Noisy intermediate-scale quantum hardware for the execution of different models having as the basis in some of them the quantum algorithm corresponding to the Quantum Fourier Transform. With this, we demonstrate the effectiveness of how this algorithm can enhance the performance of quantum computations in quantum machine learning models in near-term applications. We used the systems offered by IBM Quantum and the cross-platform Python library for quantum differentiable programming Pennylane by Xanadu Quantum Technologies Inc. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Improving the performance of ensemble algorithms by exploiting multiple cores of a processor.
- Author
-
Srinivas, J., Qyser, Ahmed Abdul Moiz, and Sirikonda, Shwetha
- Subjects
MULTICORE processors ,ALGORITHMS ,MACHINE learning ,BREAST cancer - Abstract
Multi-core processing can decrease the cost of many Machine Learning (ML) tasks by executing them in parallel using multiple cores of a processor. Modern computers are equipped with processors that contain multiple cores that can be leveraged to decrease the execution time of many ML tasks by multiple folds. Especially ensemble of ML algorithms like Random Forest (RF) can take advantage of the multi-core processing ability for improving their performance. In this paper five models using RF algorithm using Gaussian_Quantiles (GQ), Load_Wine (LW), Load_Iris (LI), Load_Breast_Cancer (BC) and Load_Digits (LD) datasets are developed and evaluated using k-fold cross-validation respectively. In general, the execution time of RF algorithm decreases as the number of cores increases. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. Independent tasks scheduling in cloud computing via improved estimation of distribution algorithm.
- Author
-
Sun, Haisheng, Xu, Rui, Chen, Huaping, Liu, Lin, Yang, Can, and Ke, Jianfeng
- Subjects
CLOUD computing ,ALGORITHMS ,MACHINE learning ,GENETIC algorithms ,MACHINE theory - Abstract
To minimize makespan for scheduling independent tasks in cloud computing, an improved estimation of distribution algorithm (IEDA) is proposed to tackle the investigated problem in this paper. Considering that the problem is concerned with multi-dimensional discrete problems, an improved population-based incremental learning (PBIL) algorithm is applied, which the parameter for each component is independent with other components in PBIL. In order to improve the performance of PBIL, on the one hand, the integer encoding scheme is used and the method of probability calculation of PBIL is improved by using the task average processing time; on the other hand, an effective adaptive learning rate function that related to the number of iterations is constructed to trade off the exploration and exploitation of IEDA. In addition, both enhanced Max-Min and Min-Min algorithms are properly introduced to form two initial individuals. In the proposed IEDA, an improved genetic algorithm (IGA) is applied to generate partial initial population by evolving two initial individuals and the rest of initial individuals are generated at random. Finally, the sampling process is divided into two parts including sampling by probabilistic model and IGA respectively. The experiment results show that the proposed IEDA not only gets better solution, but also has faster convergence speed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
13. Performance analysis of ensemble learning algorithms in intrusion detection systems: A survey.
- Author
-
Anitha and Gandhi, Rajiv
- Subjects
- *
MACHINE learning , *INTRUSION detection systems (Computer security) , *COMPUTER systems , *INTERNET security , *ALGORITHMS - Abstract
The quick development of technology not only makes life easier but also raises several security concerns, so cyber security has become very important and vital research area, rather an inevitable part of computer system. Still, various research being done on the development of effective intrusion detection system (IDS). An IDS is one of the suspicious network activities. An IDS is used to identify many types of malicious actions that can undermine a computer system's protection and confidence. Recently, ensemble algorithms are applied in IDS in order to identify and classify the security threats. In this paper author intends to do a brief review of various Ensemble learning Algorithms in ML, which are most frequently used in IDS for several applications; with specific interest in dataset and metric. This work provides broad study and investigation on current literature, the gap for improving and creating efficient IDS can be determined. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. A review on kidney tumor segmentation and detection using different artificial intelligence algorithms.
- Author
-
Patel, Vinitkumar Vasantbhai and Yadav, Arvind R.
- Subjects
- *
ARTIFICIAL intelligence , *KIDNEY tumors , *ALGORITHMS , *DEEP learning , *DATA warehousing , *MACHINE learning - Abstract
Kidney is one of the significant organs in the human body which performs filtering out blood, balances fluid, removes the waste, maintains the level of electrolytes and hormone levels. So, any disorder or dysfunction in kidney needs to be detected on time in order to preserve life. Segmentation on kidney tumor in medical field is a critical task and many conventional methods have been employed for early prediction of kidney abnormalities but with limitations such as high cost, extended time for computation and analysis with huge amount of data. Due to all such problems, the prediction rate and accuracy has reduced considerably. In order to overcome the challenges, Artificial Intelligence (AI) technology has penetrated into the field of medicine particularly in the renal department. The evolution of AI in kidney therapies improve the process of diagnosis through several Machine Learning (ML) and Deep Learning (DL) algorithms. It has the capability of improving and influencing on the status with its capacity of learning from the massive data and apply them accordingly to differentiate on the circumstances. The storage of larger data and segmentation with AI assistance are highly helpful for the analysis of occurrence of the disease. AI algorithms have predicted the severity of tumor stages with effective accuracies. Hence, this paper provides a critical review of different AI based algorithms being used in the kidney tumor prognostication. Its numerous benefits in field of segmentation have been researched from the existing works and provides an insight on the contribution of AI in the kidney disease prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Hybrid approach to SVM algorithm for sentiment analysis of tweets.
- Author
-
Patil, Harshal, Sharma, Shilpa, and Bhatt, Devershi Pallavi
- Subjects
SENTIMENT analysis ,USER-generated content ,MACHINE learning ,LOCAL mass media ,ALGORITHMS - Abstract
The community#x2019;s views and inputs have always been the main and most beneficial source for varied range of enterprises. With more widespread community media, it provides a spectacular study and assessment of many fields in which companies used to have faith in peculiar, exhausting and inaccurate ways. This form of analysis is subclass of #x2019;sentence analysis#x2019; area. Sentiment analysis is a broad term that refers to the process of effectively classifying user-generated content into specific polarities. To perform sentiment identification and analysis, a variety of tools and techniques are available, includes supervised techniques for machine-learning that classify the target group after training in data. Hybrid instruments are a blend of machine learning and lexicon-based algorithms, which classify according to annotated dictionary. We employed the SVM with Weka for analyzing sentiments in this paper. Two pre-categorized datasets of tweets are utilized. The performance of SVM is analyzed with the help of analytical metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Software defect estimation using machine learning.
- Author
-
Reddy, N. Chandra Sekhar, Peneti, Subhashini, and Sandhya, N.
- Subjects
MACHINE learning ,COMPUTER software quality control ,LIFE cycles (Biology) ,COMPUTER software ,ALGORITHMS - Abstract
Software defect estimation is an approach aiming to make an estimation of which algorithms can predict defects present in the software. This will help in improving the software quality which indeed can satisfy customers. The process is done during the development life cycle so at an early phase which reduces a lot of time and saves cost. Our model is going to be efficient because it can improve the performances and also give better results by estimation results. The main aim of this paper is to evaluate the capability of machine learning algorithms and find the best category while comparing seven machine learning algorithms within the context of NASA datasets obtained from the public PROMISE repository. The best algorithm is the one with highest accuracy rates. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Human activity recognition using ensemble machine learning classifiers.
- Author
-
Henna, Shagufta, Aboga, David, Bilal, Muhammad, and Azeez, Stephen
- Subjects
- *
HUMAN activity recognition , *MACHINE learning , *SPHERICAL coordinates , *MANUFACTURING processes , *ALGORITHMS - Abstract
Activity recognition offers a wide range of applications in various industrial processes and healthcare. This work proposes an approach to collect data from a spherical coordinate system using smartphones, then extract the highly efficient features using advanced preprocessing. The paper also proposes an algorithm to recognize activity using various ensemble machine-learning approaches based on extracted features. These approaches are evaluated under various combinations of features to analyze the accuracy, sensitivity, specificity, and training time. Experimental results reveal that weighted KNN performs best among all models by achieving 96.2% accuracy with 12 features. On the other hand, Bagged tree ensemble classifiers perform better than subspace KNN ensemble classifiers with an accuracy of 95.3% using 12 features. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. A machine learning approach to predict the rating of team using regression algorithms.
- Author
-
Ramavath, Ashok, Bhattacharjee, Vandana, and Kumar, Sanjay
- Subjects
- *
MACHINE learning , *STANDARD deviations , *ALGORITHMS - Abstract
Football is a famous sport played around the world that involves various actions from defending to attacking the ball to score goals. Various rules like half-side, No hands, Throw-ins Direct and Indirect kicks, etc. are followed. In a game, players might get yellow-cards and red-cards which serves as warning and elimination from that particular game. There are-many factors like shots, possession, pass accuracy, yellow and red cards, etc. that decides which team wins in a match. In the data that we worked on,the Rating is calculated from the parameters which are mentioned. Machine learning regression algorithms have been applied to predict the Rating feature. The goal of this paper is to know which regression algorithm performs better to predict the Rating variable. Evaluation metrics like Root mean square error (RMSE), Mean absolute error (MAE), and R square (R2) are used to identify the best algorithm among the applied algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. Classification of spam detection using random forest algorithm over naive bayes algorithm based on accuracy.
- Author
-
Reddy, K. Seshasayana and Gayathri, A.
- Subjects
- *
SPAM email , *RANDOM forest algorithms , *MACHINE learning , *ALGORITHMS , *CLASSIFICATION - Abstract
To predict the accuracy percentage of Short Message Services (SMS) spam detection using machine learning classifiers. Two ensemble learning algorithms named random forest algorithm and naive bayes are applied to data. The algorithms have been implemented and tested over a dataset which consists of 5574 records. Ensemble learning methods combined several models trained with a given learning algorithm to improve accuracy. After performing the experiment as result shows mean accuracy of 89.75 % by using random forest and compared naive bayes algorithm mean accuracy is 88.05% for SMS spam detection. There is a statistically significant difference in accuracy for two algorithms is p<0.05 by performing independent samples t-tests. This paper is intended to implement Innovative Classification for prediction of SMS spam detection. The comparison results shows that the naive bayes algorithm has appeared to be better performance than Random Forest Algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. An improved approaches for novel mining serendipitous drug to generate and validate drug repositioning hypotheses from social media comparing with Adaboost algorithm.
- Author
-
Suhana, Syed Sumaya and Kumar, S. Ashok
- Subjects
- *
DRUG repositioning , *MACHINE learning , *SUPPORT vector machines , *ALGORITHMS , *SOCIAL media - Abstract
The aim of this paper is mining serendipitous drug usage to validate and generate drug repositioning hypotheses from social media. Materials and Methods: Two machine learning algorithms svm with sample size=12 and adaboost algorithm with sample size=12. Results: The support vector machine algorithm has shown more accuracy of (96. 66%) in reducing the false positive rates when compared with Adaboost algorithm accuracy(84.6%). The pre-test was calculated with a g-power value = 80% and threshold 0. 05% confidence interval of 95% mean and standard deviation by using the G-power tool. t is found that the svm algorithm has more accuracy percentage when compared with the Adaboost algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. A survey machine learning based object detections in an image.
- Author
-
Mohmmad, Sallauddin, Dadi, Ramesh, Kothandaraman, D., Sudarshan, E., Pasha, Syed Nawaz, and Shaik, Mohammed Ali
- Subjects
OBJECT recognition (Computer vision) ,MACHINE learning ,IMAGE processing ,ALGORITHMS ,COMPUTER vision - Abstract
One of the research emergence as per studied problem on the image processing based computer vision is that object detection in a image with bounding boxes. This complicated processing has to be done with help of machine leaning based algorithms only. In the recent years research has done with machine leaning algorithms like CNN,RCNN, Fast RCNN,FasterRCNN,Yolo algorithm and etc.These algorithms have achieved the proposed concept in different levels. In this paper we presented the comparative study of each algorithm and provided efficiency and weakness contexts. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Monitoring and control of temperature, humidity using machine learning.
- Author
-
Shukla, Arvind Kumar, Gupta, Ashish, Arunraja, A., Madhuvappan, C. Arunkumar, Vijayan, V., Dinesh, S., Parthiban, A., and Srinivasan, R.
- Subjects
TEMPERATURE control ,MACHINE learning ,WEATHER ,ALGORITHMS ,HUMIDITY ,INFORMATION needs - Abstract
In this paper, In Recent Year Machine learning plays important role in analyzing the various time of weather condition all around the world especially Indian Subcontinent. Data is available in the government website to analyze the data for few long years. This should be matched with UCI technique for the machine learning and obtain the condition of different level of data repository. Temperature and humidity level condition of different parameters were analyzed and taken as example of weather condition to monitor the weather condition. We need to design a model to fit the different condition and need to extrapolating the needs of information, and optimize the technique using some algorithm and variation should be targeted and value should be analyzed. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
23. Performance analysis of various sarcasm detection algorithms based on feature extraction methods.
- Author
-
Aboobaker, Jihad and Ilavarasan, E.
- Subjects
- *
MACHINE learning , *SUPPORT vector machines , *DECISION trees , *FEATURE extraction , *SARCASM , *SENTIMENT analysis , *RANDOM forest algorithms , *ALGORITHMS - Abstract
Sentiment analysis of text data has become very much popular in past few years, because of the interesting challenges it can offer. Among these challenges, sarcasm is unique. We can address sarcasm as the 'Achilles heel ' of sentiment analysis. Detection of sarcasm from the given data is same time complicated and interesting. It is interesting because, if researchers can find the optimized solutions for finding sarcastic words in the data, it will enhance the sentiment analysis of that data. Even humans also have difficulties in understanding the actual interpretation of a sentence, if it is presented indirectly. This means, a person stated something, but he meant contradictory to the word meaning of the statement. This makes sarcasm detection an interesting topic for researchers. In this paper, we evaluated the performance of several machine learning models like Support vector machine, Naïve Bayes, Decision tree etc., and different ensemble models like Random Forest, XGBoost and AdaBoost etc., with the collaboration of various feature extraction methods such as Term Frequency-Inverse Document Frequency etc. The main evaluation metrics we used to evaluate the performance are accuracy, precision, f-score and recall. Based on the results, we concluded that the models such as XGBoost, LightGBM and Bagging classifiers provide better results in detecting sarcasm with respect to other machine learning models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Detector Distribution in the Vehicle Unit.
- Author
-
Wang Chen, Yong Liu, Jianjun Hu, and Xueyan Sun
- Subjects
MACHINE learning ,ALGORITHMS ,PARTICLE swarm optimization ,MATHEMATICAL optimization ,VEHICLES - Abstract
In view of the needs of the vehicle unit, this paper has carried on the research to the sensor distribution question. In the case of fully taking into account the information such as target identity and target priority, the mathematical model of optimal sensor allocation is established based on the maximum information gain criterion, and then the population-based incremental learning algorithm is used to solve. Finally, the validity of the method is verified by solving the problem of sensor assignment problem of the vehicle unit. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
25. Comparison between machine learning and deep learning for intrusion detection.
- Author
-
Ajeel, Huda Mohsin and Ali, Thekra Hayder
- Subjects
- *
DEEP learning , *MACHINE learning , *PATTERN recognition systems , *COMPUTER network security , *DATA security , *ALGORITHMS - Abstract
In the domain of network security, there is a never-ending quest for cyber-attacks that might disrupt a network. Furthermore, hostile actions in the network are rapidly increasing because of the unanticipated inception and rising use of the Internet. It is important to build a reliable intrusion detection system (IDS) to resist unwanted access to network resources, Information protection, and network intrusion detection. Deep learning has recently acquired popularity because of the possibilities it has for machine learning. As a result, Deep Learning algorithms are being used in a variety of domains, including pattern recognition and categorization. Intrusion detection analysis used data from security event monitoring to assess the network's status. Several traditional machine-learning algorithms for intrusion detection have been proposed, however detection performance and accuracy must be improved. This paper examines the many methods that have been used to classify network traffic in real-time. We selected to experiment with various methods on UNSW-NB15 datasets to find the optimum way for real-time intrusion detection. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Enhanced sparse matrix approach in neural network algorithm for an effective intelligent classification system.
- Author
-
Sagir, Abdu Masanawa, Abubakar, Hamza, Ibrahim, Siti Nur Iqmal, Ibrahim, Noor Akma, Ismail, Fudziah, Lee, Lai Soon, Leong, Wah June, Midi, Habshah, and Wahi, Nadihah
- Subjects
SPARSE matrices ,ALGORITHMS ,MACHINE learning ,CLASSIFICATION ,KEY performance indicators (Management) ,ARTIFICIAL neural networks - Abstract
The main objective of this research is to develop an effective intelligent system that can be used by medical practitioners (physicians) to accelerate diagnosis and treatment processes. In this paper, the sparse matrix approach was incorporated in neural network learning algorithm for scalability, minimize higher memory usage/storage capacity, enhancing implementation time and speed up the analysis of the data. The proposed intelligent classification system maximizes the intelligently classification of data and minimizes the number of trends inaccurately identified. For robustness, the proposed method was tested with three different datasets, namely, Hepatitis, SPECT Heart and Cleveland Heart. Therefore, an attempt was made to determine the performance indicators efficacy. Compared to some similar existing methods, the approach presented achieves improved performance. The program used for implementation of the proposed model is MATLAB R2016a (version 9.0) and executed in the 4.0 GB RAM processor of PC Intel Pentium Quad Core N3700. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
27. Methodology for experimental verification of software that implements the algorithm for graphematic analysis and preprocessing of text resources.
- Author
-
Petrushevskaya, Anastasia and Rabin, Alexey
- Subjects
SOFTWARE verification ,ALGORITHMS ,PROBLEM solving ,PYTHON programming language ,TEXT files ,MACHINE learning ,TELEPHONE numbers - Abstract
A technique has been developed for experimental verification of software that implements the algorithm for graphematic analysis and preprocessing of text resources. This software is used to solve the problem of automated mining analysis of poorly structured data. It is designed to extract semantically significant constructs from poorly structured resources, which is achieved by transforming text using a number of auxiliary algorithms and classifying the data obtained using machine learning algorithms in Python. At the first stage of the developed algorithm, abbreviations and acronyms are searched in a text file. After searching for abbreviations and acronyms using templates, a search is performed for graphematic descriptors, namely name, email and URL, phone number and date. At the final stage of the developed algorithm, the boundaries of sentences and direct speech are distinguished. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
28. X-ray image segmentation with the use of machine learning algorithms.
- Author
-
Artemyev, M. S., Serazetdinov, A. R., Smirnov, A. A., Volkovich, Vladimir A, Kashin, Ilya V, Smirnov, Andrey A, and Narkhov, Evgeniy D
- Subjects
- *
X-ray imaging , *MACHINE learning , *MAGNETIC resonance imaging , *ALGORITHMS , *BRAIN tumors , *IMAGE segmentation - Abstract
Brain tumor images segmentation plays a crucial role in the auxiliary diagnosis of disease, treatment planning and surgical navigation. In order to accurately segment brain tumor images, this paper proposes an automatic brain tumor Magnetic Resonance Imaging (MRI) image segmentation algorithm based on the U-net model. The neuron network based approached was closely analyzed in comparison with standard segmentation techniques (detection by threshold, K-means clustering, histogram-based approach and edge detection). The algorithm is validated and evaluated on the Jun Cheng dataset. The experimental results show that the proposed algorithm has strong competitiveness compared with the existing brain tumor MRI image segmentation algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
29. Role of machine learning algorithms over heart diseases prediction.
- Author
-
Jonnavithula, Siva Kumar, Jha, Abhilash Kumar, Kavitha, Modepalli, Srinivasulu, Singaraju, Haldorai, Anandakumar, Ramu, Arulmurugan, and Onn, Chow Chee
- Subjects
HEART diseases ,MACHINE learning ,FORECASTING ,ALGORITHMS ,HUMAN body ,HEART disease related mortality - Abstract
Circulation of blood in human body is essential for life. So, it won't be wrong to say the most important part of or body is heart since it pumps (or circulates) the blood to each part of body. Getting diseases related to heart is directly meaning to getting disease related to our most important part of the body. According to WHO every year 17 million of people dies by heart diseases, it means more than one third death of all death is being caused by the heart diseases. In modern days, Machine learning algorithms are being the solution for different medical fields, for this case also we can use machine learning algorithms to predict the heart diseases. Here we are going to compare the accuracy of different machine learning technique over "heart.csv" dataset and conclude which algorithm gives the best result. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
30. A Comparison of different learning models used in Data Mining for Medical Data.
- Author
-
Srimani, P. K. and Koti, Manjula Sanjay
- Subjects
DATA mining ,MACHINE learning ,STOCHASTIC learning models ,COMPARATIVE studies ,MEDICAL records ,ALGORITHMS ,DECISION making - Abstract
The present study aims at investigating the different Data mining learning models for different medical data sets and to give practical guidelines to select the most appropriate algorithm for a specific medical data set. In practical situations, it is absolutely necessary to take decisions with regard to the appropriate models and parameters for diagnosis and prediction problems. Learning models and algorithms are widely implemented for rule extraction and the prediction of system behavior. In this paper, some of the well-known Machine Learning(ML) systems are investigated for different methods and are tested on five medical data sets. The practical criteria for evaluating different learning models are presented and the potential benefits of the proposed methodology for diagnosis and learning are suggested. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
31. An improved initialization center k-means clustering algorithm based on distance and density.
- Author
-
Duan, Yanling, Liu, Qun, Xia, Shuyin, Liu, Lin, Yang, Can, and Ke, Jianfeng
- Subjects
K-means clustering ,CLUSTER analysis (Statistics) ,MACHINE learning ,OUTLIERS (Statistics) ,ALGORITHMS - Abstract
Aiming at the problem of the random initial clustering center of k means algorithm that the clustering results are influenced by outlier data sample and are unstable in multiple clustering, a method of central point initialization method based on larger distance and higher density is proposed. The reciprocal of the weighted average of distance is used to represent the sample density, and the data sample with the larger distance and the higher density are selected as the initial clustering centers to optimize the clustering results. Then, a clustering evaluation method based on distance and density is designed to verify the feasibility of the algorithm and the practicality, the experimental results on UCI data sets show that the algorithm has a certain stability and practicality. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. An overview of the most efficient methods for predicting healthcare disorders.
- Author
-
Oussous, Aicha, Ez-Zahout, Abderrahmane, Ziti, Soumia, and Oussous, Ahmed
- Subjects
DEEP learning ,SUPERVISED learning ,REINFORCEMENT learning ,ARTIFICIAL intelligence ,MACHINE learning ,ALGORITHMS - Abstract
Recently, the world has a treasure of data; health data is one of them. Artificial intelligence (AI), especially machine learning (ML), is required to analyze these data and construct the associated innovative applications intelligently. There are several kinds of algorithms, including unsupervised, supervised, reinforcement and semi-supervised learning. Deep learning, which is component of a wider family of machine learning technologies, can also examine massive volumes of data successfully. This study aims to review various different healthcare disease prediction strategies such as single techniques, hybrid methods, and hybrid ensemble approaches in machine learning and deep learning. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Facial recognition system using LBPH algorithm by open source computer vision library.
- Author
-
Rao, S. Venkata Achuta, Kumar, Samudrala Vinay, Damudi, Fahad Z., Nikhil, Kunchakuri, and Nazimuddin, Mohammed
- Subjects
COMPUTER vision ,HUMAN facial recognition software ,MACHINE learning ,SMARTPHONES ,DATABASES ,ALGORITHMS - Abstract
Facial recognition is a way to identify or confirm a person's identity using their facial features, through pre - configured software. This can be done in real-time and also through previously captured videos and images. Facial recognition has a wide range of uses starting from smart phones to Law enforcement uses. It can be categorized under the biometric security form where it detects human faces for security or verification purposes. Facial recognition employs a machine learning algorithm that finds captures and analyses facial features. Initially, the system detects the features of the human face followed by an analysis of the captured features. Then it matches the same with existing images and their features stored in the database. It authenticates the user if a match is found and disallows him/her if a match is not found. Facial recognition systems are very effective and reliable for many purposes, generally used for biometric security, attendance, unlocking smart phones, identifying people, and many other uses. The proposed system removes the dependence of users on heavy CCTV cameras and instead could be used by any camera, even those built in smart phones. In other words, smart phones could be placed at strategic points instead of installing a CCTV which is usually fixed at oneplace and could not be removed. The proposed system is much faster in capturing the information and relays the results faster. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Application of Human Cognitive Mechanisms to Naïve Bayes Text Classifier.
- Author
-
Hidetaka Taniguchi, Hiroshi Sato, and Tomohiro Shirakawa
- Subjects
- *
MACHINE learning , *ALGORITHMS , *MATHEMATICAL models of learning , *COGNITION , *PREJUDICES - Abstract
Machine learning is a widely researched topic, and its use is rapidly becoming widespread. In most cases, however, machine learning algorithms require considerable time and large quantities of sample data, and its implementation requires much effort. In contrast, human scan generalize concepts from only a small number of examples. Some researchers are attempting to implement this ability into machine learning models. In this paper, we develop two machine learning models based on human cognitive biases, thereby achieving better performance in comparison with other representative machine learning models. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
35. Accuracy prediction of paddy rice for quality using novel canny algorithm in comparing with image processing techniques.
- Author
-
Pavan Kumar, A. and Jaisharma, K.
- Subjects
IMAGE processing ,RICE quality ,MACHINE learning ,ALGORITHMS ,RICE ,PADDY fields ,FORECASTING - Abstract
In the modern world, there are numerous models for classifying and identifying paddy rice on the market today as it is more crucial to use technologies like image processing since they have made it feasible to serve high-quality food to more people. When algorithms are run in Indian farmer sheds using this model-based application, higher profits are made with less investments. The major issue with the current image processing algorithm system are the data gathered were from specific ethic groups. The canny methods on machine learning algorithms works in a few data sample categories. However, in the proposed work, various large category datasets that were gathered from Kaggle were used to analyze the performance of the canny algorithm. The primary goal of the research was to increase the accuracy of paddy rice adulteration prediction utilizing novel Canny algorithms and comparison with image processing techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Fake news detection system using naive bayes algorithm and compare textual property with support vector machine algorithm.
- Author
-
Neelapala, Leela Siva Rama Krishna and Malaiyalathan, Adimoolam
- Subjects
SUPPORT vector machines ,FAKE news ,MACHINE learning ,ALGORITHMS - Abstract
To perform accurate Fake News Detection using Naive Bayes (NB) algorithm and compare textual property accuracy with Support Vector Machine (SVM) algorithm. In this proposed research, the analysis was done for fake news detection by using machine learning algorithms such as the NB algorithm (N=311) and SVM algorithm (N=311). Using the NB algorithm and SVM algorithm the accuracy of fake news were measured. The NB algorithm accuracy appears to be 95.01% and SVM algorithm accuracy appears to be 91.69%. There is a statistically significant difference among the study groups with significance value 0.571 for accuracy and 0.994 for precision. The NB algorithm helps in examining whether a piece of news is fake or not with accuracy appears to be more than the SVM algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Analysis of logistic regression algorithm for predicting types of breast cancer based on machine learning.
- Author
-
Maulidia, Annisa, Lidyawati, Lita, Jambola, Lucia, and Kristiana, Lisa
- Subjects
REGRESSION analysis ,MACHINE learning ,BREAST cancer ,PYTHON programming language ,DIAGNOSTIC errors ,LOGISTIC regression analysis ,ALGORITHMS - Abstract
Algorithms in machine learning are a very important part because the type of algorithm used has an impact on the level of prediction accuracy and classification of a data set that is used. Appropriate use is accompanied by machine learning capabilities, namely being able to study past patterns, making machine learning have an advantage in prediction accuracy which can reach up to 90%. Therefore, machine learning has the opportunity to be an alternative that can avoid diagnostic errors that occur in the case of breast cancer. Breast cancer is one of the highlights of the impact of diagnostic errors because there are 10-30% of cases due to diagnostic errors, thus we need an alternative that can help reduce these diagnostic errors. In this study, an analysis of the logistic regression algorithm was carried out using the python programming language. The evaluation method is very important to know the performance in the prediction process. By using three evaluation methods, namely cross-validation k=10, confusion matrix, and ROC AUC. From the results of this study, it was found that the algorithm Logistic regression has an accuracy of 96.5% and an error of 0.19. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Bioinspired algorithm for selecting semantically significant features in linguistic information processing tasks.
- Author
-
Rodzin, Sergey, Bova, Victoria, Kravchenko, Yuri, and Rodzina, Lada
- Subjects
INFORMATION processing ,WILCOXON signed-rank test ,ALGORITHMS ,LEARNING problems ,MACHINE learning ,NAIVE Bayes classification - Abstract
The article proposes bioheuristics for selecting informative features of classification in the problems of processing linguistic information. Bioheuristics is based on combining, generalizing, and adapting simpler heuristics depending on the current state of the solution. The experiments used a metric algorithm to automatically classify objects with k nearest neighbors and a classification tree algorithm. The effectiveness of bioheuristics was evaluated on information from the UCI repository of real and model machine learning problems. In the comparative evaluation of methods, non-parametric statistical tests were used, such as the Wilcoxon signed-rank test and Friedman test. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Smart device for women safety using machine learning based logic regression algorithm.
- Author
-
Srividhya, R., Nair, Suma, Aishwariya, Lakshimi N., Halder, Rithwik, and Naidu, Harshavardhan
- Subjects
MACHINE learning ,ALARMS ,FEMINISM ,LOGIC ,SMART devices ,ALGORITHMS ,TEMPERATURE sensors - Abstract
These days singular prosperity has become a huge disadvantage for everybody, particularly for women. A new review made by UN organization demonstrates 35% of women are worldwide confronting some sort of misuse and actual brutality. As of now there's no sensible answer for the current circumstance. As they have a lot of human mediation to run, the current programming and contraptions don't seem, by all accounts, to be a store of plentiful execution. The proposed answer for address such conditions is to foster a wearable device that can go about as a watchman for women for minimal price. The proposed wearable women monitor gadget precisely sweeps and produce designs like temperature and indispensable sign so it closes out the verge for creating caution. In the event that the readings square measures past the limit, it decisively sends message and the important move is made. We utilized temperature and heartbeat sensors which can sense the movement of women and these data's are shipped off the cloud where an AI framework is smeared to research the data created. The data is first assembled by sensors at safe circumstances to prepare the AI framework. Then, at that point at the hour of peculiar sensor readings, it is being contrasted and the prepared framework. It produces caution and afterward sends the alarm messages and calls through the web for salvage of the ladies at issue. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
40. An Auxiliary Classification Diagnosis Software Development of Cervical Cancer Medical Data Based on Various Artificial Neural Networks.
- Author
-
Yong Qi, Kai Lei, Lizeqing Zhang, Ximing Xing, and Wenyue Gou
- Subjects
- *
CERVICAL cancer diagnosis , *COMPUTER software development , *MEDICAL databases , *ARTIFICIAL neural networks , *ALGORITHMS - Abstract
This paper introduced the development of a self-serving medical data assisted diagnosis software of cervical cancer on the basis of artificial neural network (SVN. FNN, KNN). The system is developed based on the idea of self-service platform, supported by the application and innovation of neural network algorithm in medical data identification. Furthermore, it combined the advanced methods in various fields to effectively solve the complicated and inaccurate problem of cervical canceration data in the traditional manual treatment. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
41. Classification of attack mechanisms and research of protection methods for systems using machine learning and artificial intelligence algorithms.
- Author
-
Volodin, Ilya, Putyato, Michael, Makaryan, Alexander, Evglevsky, Vyacheslav, and Evsyukov, Michael
- Subjects
ARTIFICIAL intelligence ,MACHINE learning ,RESEARCH methodology ,ALGORITHMS ,COMPUTER systems ,IMAGE compression ,COMPUTER networks - Abstract
This article provides a complete classification of attacks using artificial intelligence. Three main identified sections were considered: attacks on information systems and computer networks, attacks on artificial intelligence models (poisoning attacks, evasion attacks, extraction attacks, privacy attacks), attacks on human consciousness and opinion (all types of deepfake). In each of these sections, the mechanisms of attacks were identified and studied, in accordance with them, the methods of protection were set. In conclusion, a specific example of an attack using a pretrained model was analyzed and protected against it using the method of modifying the input data, namely, image compression in order to get rid of extraneous noise. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
42. Digit recognition for Arabic/Jawi and Roman using features from triangle geometry.
- Author
-
Azmi, Mohd Sanusi, Omar, Khairuddin, Nasrudin, Mohamad Faidzul, Idrus, Bahari, and Wan Mohd Ghazali, Khadijah
- Subjects
PATTERN recognition systems ,TRIANGLES ,ALGORITHMS ,MACHINE learning ,DATA mining ,SUPPORT vector machines ,DIGITAL image processing ,EUCLIDEAN distance - Abstract
A novel method is proposed to recognize the Arab/Jawi and Roman digits. This new method is based on features from the triangle geometry, normalized into nine features. The features are used for zoning which results in five and 25 zones. The algorithm is validated by using three standard datasets which are publicly available and used by researchers in this field. The first dataset is HODA that contains 60,000 images for training and 20,000 images for testing. The second dataset is IFHCDB. This dataset has 52,380 isolated characters and 17,740 digits. Only the 17,740 images of digits are used for this research. For the roman digit, MNIST are chosen. MNIST dataset has 60,000 images for training and 10,000 images for testing. Supervised (SML) and Unsupervised Machine Learning (UML) are used to test the nine features. The SML used are Neural Network (NN) and Support Vector Machine (SVM). Whereas the UML uses Euclidean Distance Method with data mining algorithms; namely Mean Average Precision (eMAP) and Frequency Based (eFB). Results for SML testing for HODA dataset are 98.07% accuracy for SVM, and 96.73% for NN. For IFHCDB and MNIST the accuracy are 91.75% and 93.095% respectively. For the UML tests, HODA dataset is 93.91%, IFHCDB 85.94% and MNIST 86.61%. The train and test images are selected using both random and the original dataset's distribution. The results show that the accuracy of proposed algorithm is over 90% for each SML trained datasets where the highest result is the one that uses 25 zones features. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
43. Applications of Support Vector Machines In Chemo And Bioinformatics.
- Author
-
Jayaraman, V. K. and Sundararajan, V.
- Subjects
SUPPORT vector machines ,BIOINFORMATICS ,NONLINEAR statistical models ,REGRESSION analysis ,ARTIFICIAL intelligence ,MACHINE learning ,ALGORITHMS ,CHEMICAL kinetics ,CHEMINFORMATICS - Abstract
Conventional linear & nonlinear tools for classification, regression & data driven modeling are being replaced on a rapid scale by newer techniques & tools based on artificial intelligence and machine learning. While the linear techniques are not applicable for inherently nonlinear problems, newer methods serve as attractive alternatives for solving real life problems. Support Vector Machine (SVM) classifiers are a set of universal feed-forward network based classification algorithms that have been formulated from statistical learning theory and structural risk minimization principle. SVM regression closely follows the classification methodology. In this work recent applications of SVM in Chemo & Bioinformatics will be described with suitable illustrative examples. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
44. A Source Identification Algorithm for INTEGRAL.
- Author
-
Scaringi, Simone, Bird, Antony J., Clark, David J., Dean, Anthony J., Hill, Adam B., McBride, Vanessa A., and Shaw, Simon E.
- Subjects
ALGORITHMS ,MACHINE learning ,GAMMA rays ,TELESCOPES ,ASTROPHYSICS - Abstract
We give an overview of ISINA: INTEGRAL Source Identification Network Algorithm. This machine learning algorithm, using Random Forests, is applied to the IBIS/ISGRI dataset in order to ease the production of unbiased future soft gamma-ray source catalogues. The key steps of candidate searching, filtering and feature extraction are described. Three training and testing sets are created in order to deal with the diverse timescales and diverse objects encountered when dealing with the gamma-ray sky. Three independent Random Forest are built: one dealing with faint persistent source recognition, one dealing with strong persistent sources and a final one dealing with transients. For the latter, a new transient detection technique is introduced and described: the Transient Matrix. Finally the performance of the network is assessed and discussed using the testing set and some illustrative source examples. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.