Showing 621 - 640 results of 51,339 for search 'learning (method OR methods)', query time: 0.42s Refine Results
  1. 621
  2. 622

    Use of Mnemonics as Teaching and Learning Adjuvant for Ayurveda Undergraduate Students: A Research Protocol by Preeti Sujit Borkar, Bharat Rathi, Monika Luharia, Rushikesh Thakre

    Published 2025-07-01
    “…The parameters for evaluation will include pretests and post-tests using the traditional teaching and learning method alongside the mnemonic teaching and learning method as its supplement. …”
    Get full text
    Article
  3. 623
  4. 624
  5. 625
  6. 626

    Predictive analytics of student performance: Multi-method and code by Alla Yu. Vladova, Katsiaryna M. Borchyk

    Published 2024-10-01
    “…Despite the significant amount of collected diagnostic data, education managers underutilize machine learning methods to improve the accuracy of predicting academic performance. …”
    Get full text
    Article
  7. 627

    An Intelligent Diagnosis Method for NIID Based on Cross Self-supervision and DWI by CAO Fei, XU Qianqian, CHEN Hao, ZU Jie, LI Xiaowen, TIAN Jin, BAO Lei

    Published 2025-06-01
    “…This research proposes a deep learning method based on cross self-supervision, alongside the construction of Co-ResNet50 and CO-ViT models for intelligent auxiliary diagnosis of NIID. …”
    Get full text
    Article
  8. 628

    Adaptive Control of an Inverted Pendulum by a Reinforcement Learningbased LQR Method by Uğur Yıldıran

    Published 2023-12-01
    “…Inverted pendulums constitute one of the popular systems for benchmarking control algorithms. Several methods have been proposed for the control of this system, the majority of which rely on the availability of a mathematical model. …”
    Get full text
    Article
  9. 629
  10. 630

    Using Computational Methods to Explore Law in Sermons by Markus M. Totzeck, Valentin Fuchs

    Published 2025-05-01
    “…In this article, we present the first findings of the ongoing <i>RUNIP</i> project, in which computer-assisted methods are used and validated in sermon analysis. …”
    Get full text
    Article
  11. 631
  12. 632
  13. 633

    An efficient method for identifying surface damage in hydraulic concrete buildings by Libo Yang, Dawei Zhu, Xuemei Liu

    Published 2024-12-01
    “…The results demonstrated that the accuracies of this method in identifying crack, fracture, hole and normal structures were 87.65%, 87.82%, 96.99%, and 95.25%, respectively. …”
    Get full text
    Article
  14. 634

    Multiview clustering method for view-unaligned data by Ao LI, Cong FENG, Yutong NIU, Shibiao XU, Yingtao ZHANG, Guanglu SUN

    Published 2022-07-01
    “…A new challenge for multi-view learning was posed by corrupted view-correspondences.To address this issue, an effective multi-view learning method for view-unaligned data was proposed.First,to capture cross-view latent affinity in multi-view heterogenous feature spaces,representation learning was employed based on multi-view non-negative matrix factorization to embed original features into a measurable low-dimensional subspace.Second, view-alignment relationships were modeled as optimal matching of a bipartite graph, which could be generalized to multiple-views situations via the proposed concept reference view.Representation learning and data alignment were further integrated into a unified Bi-level optimization framework to mutually boost the two learning processes, effectively enhancing the ability to learn from view-unaligned data.Extensive experimental results of view-unaligned clustering on three public datasets demonstrate that the proposed method outperforms eight advanced multiview clustering methods on multiple evaluation metrics.…”
    Get full text
    Article
  15. 635
  16. 636

    Detecting command injection attacks in web applications based on novel deep learning methods by Xinyu Wang, Jiqiang Zhai, Hailu Yang

    Published 2024-10-01
    “…Traditional detection methods struggle with the increasing complexity and obfuscation of these attacks, resulting in poor identification of malicious code, complicated feature extraction processes, and low detection efficiency. …”
    Get full text
    Article
  17. 637
  18. 638
  19. 639
  20. 640