Showing 741 - 760 results of 51,339 for search 'learning (method OR methods)', query time: 0.43s Refine Results
  1. 741

    The clinical method as a teaching method in the Medical Career by Luis Alberto Corona Martínez, Mercedes Fonseca Hernández

    Published 2010-12-01
    “…This paper’s main purpose is to consider the clinical method as the teaching method for teaching, learning and developing the doctors’ professional abilities.…”
    Get full text
    Article
  2. 742

    Method for Knowledge Transfer via Multi-Task Semi-Supervised Self-Paced by Yao Zhao, Hongying Liu, Huaxian Pan, Zhen Song, Chunting Liu, Anni Wei, Baoshuang Zhang, Wei Lu

    Published 2025-01-01
    “…Adequate labeled data is essential for learning a reliable and generalizable model in many machine learning tasks. …”
    Get full text
    Article
  3. 743

    Radar Jamming Recognition: Models, Methods, and Prospects by Zan Wang, Zhengwei Guo, Gaofeng Shu, Ning Li

    Published 2025-01-01
    “…Specifically, first building a system framework for jamming models, including deception jamming, suppression jamming, and smart jamming, thoroughly explaining the operational mechanisms. Then, recognition methods based on traditional machine learning are summarized and are delved into the advantages and disadvantages of feature extraction methods and classifiers. …”
    Get full text
    Article
  4. 744

    A network intrusion detection method designed for few-shot scenarios by Weichen HU, Congyuan XU, Yong ZHAN, Guanghui CHEN, Siqing LIU, Zhiqiang WANG, Xiaolin WANG

    Published 2023-10-01
    “…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
    Get full text
    Article
  5. 745

    A Comparison of Behavior Cloning Methods in Developing Interactive Opposing-Force Agents by Logan Lebanoff, Nicholas Paul, Christopher Ballinger, Patrick Sherry, Gavin Carpenter, Charles Newton

    Published 2023-05-01
    “…In our approach, users start by defining desired behavior through straightforward methods such as state machine models or behavior trees. …”
    Get full text
    Article
  6. 746
  7. 747
  8. 748
  9. 749

    Enhancing arabic morphology learning for beginners: the effectiveness of the eclectic method in modern islamic boarding school by Syahrani Dewi Ajie, Asep Sopian, Shofa Musthofa Khalid

    Published 2024-10-01
    “…For beginner learners of Arabic, morphology is difficult to master because of many changes in word form, so an appropriate learning method is needed to make learning more effective. …”
    Get full text
    Article
  10. 750
  11. 751

    Statistics release and privacy protection method of location big data based on deep learning by Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG

    Published 2022-01-01
    “…Aiming at the problems of the unreasonable structure and the low efficiency of the traditional statistical partition and publishing of location big data, a deep learning-based statistical partition structure prediction method and a differential publishing method were proposed to enhance the efficacy of the partition algorithm and improve the availability of the published location big data.Firstly, the two-dimensional space was intelligently partitioned and merged from the bottom to the top to construct a reasonable partition structure.Subsequently, the partition structure matrices were organized as a three-dimensional spatio-temporal sequence, and the spatio-temporal characteristics were extracted via the deep learning model in a bid to realize the prediction of the partition structure.Finally, the differential privacy budget allocation and Laplace noise addition were implemented on the prediction partition structure to realize the privacy protection of the statistical partition and publishing of location big data.Experimental comparison of the real location big data sets proves the advantages of the proposed method in improving the querying accuracy of the published location big data and the execution efficiency of the publishing algorithm.…”
    Get full text
    Article
  12. 752

    A cooperative jamming mode adjustment method based on Multi-Agent reinforcement learning by Jieling Wang, Yanfei Liu, Chao Li, Dongdong Yang, Qingshan Yin

    Published 2025-11-01
    “…To address this, we propose a Multi-agent Joint Collaborative Jamming Adjustment Method (MJCJMA). Firstly, a non-cooperative adversarial scenario model is constructed, employing an improved snow melting algorithm (GPSAO-LSSVM) for radar threat pre-evaluation. …”
    Get full text
    Article
  13. 753

    Prediction of the Control Effect of Fractured Leakage in Unconventional Reservoirs Using Machine Learning Method by Lei Pu, Jianjian Song, Mingbiao Xu, Jun Zhou, Peng Xu, Shanshan Zhou

    Published 2022-01-01
    “…Aiming at the problem of frequent fracture leakage during drilling in Chepaizi block, Xinjiang, China, this paper proposes a set of machine learning methods based on a neural network. Three types of factors and 14 parameters with a strong correlation with the leakage control effect were screened out. …”
    Get full text
    Article
  14. 754
  15. 755
  16. 756

    A self-learning method with domain knowledge integration for intelligent welding sequence planning by Weidong Shen, Xuewen Wang, Juanli Li, Yong Wang, Xiaojun Qiao

    Published 2025-07-01
    “…Abstract Due to the emergence of mass personalized production, intelligent welding systems must achieve high levels of productivity and flexibility. Therefore, a self-learning welding-task sequencing method that is driven by data and knowledge was developed during this study. …”
    Get full text
    Article
  17. 757
  18. 758

    Distributed Unmanned Aerial Vehicle Cluster Testing Method Based on Deep Reinforcement Learning by Dong Li, Panfei Yang

    Published 2024-12-01
    “…To solve this problem, a distributed method for UAV cluster testing, called UTDR (distributed UAV cluster Testing method by using Deep Reinforcement learning), based on the Deep Deterministic Policy Gradient (DDPG) is proposed in this work. …”
    Get full text
    Article
  19. 759

    Load identification method based on one class classification combined with fuzzy broad learning by Wang Yi, Wang Xiaoyang, Li Songnong, Chen Tao, Hou Xingzhe, Fu Xiuyuan

    Published 2022-05-01
    “…In order to improve the stability and accuracy of the load identification model, a power load identification method combining single classification and fuzzy broad learning is proposed. …”
    Get full text
    Article
  20. 760

    A monocular distance measurement method for underground track obstacles based on deep learning by Yuanyuan XU, Qinghua CHEN, Yingsong CHENG

    Published 2025-02-01
    “…Aiming at the problem of anti-collision warning during underground electric locomotive running, a deep learning-based obstacle location method for underground track is proposed. …”
    Get full text
    Article