Showing 2,461 - 2,480 results of 11,478 for search 'learning function', query time: 0.25s Refine Results
  1. 2461

    Applications of machine learning to high temperature and high pressure environments: A literature review by Hengkai Wang, Zengtao Lv, Santosh Kumar, Qinglin Wang

    Published 2024-12-01
    “…In addition, its simulation process is very fast, and the cost is not as expensive as that of density functional theory, so machine learning in the field of HTHP computing has aroused great research interest. …”
    Get full text
    Article
  2. 2462

    Using machine learning techniques for DSP software performance prediction at source code level by Weihua Liu, Erh-Wen Hu, Bogong Su, Jian Wang

    Published 2021-01-01
    “…To validate the new model, we measure experimentally the execution time of a set of functions selected from PHY DSP Benchmark and run them on TIC64 DSP processor. …”
    Get full text
    Article
  3. 2463

    Industrial data-driven machine learning soft sensing for optimal operation of etching tools by Feiyang Ou, Henrik Wang, Chao Zhang, Matthew Tom, Sthitie Bom, James F. Davis, Panagiotis D. Christofides

    Published 2024-12-01
    “…Two types of models with different loss functions are tested to compare the effects of the Mean Squared Error (MSE) and Mean Absolute Percentage Error (MAPE) loss functions on model performance. …”
    Get full text
    Article
  4. 2464

    Wake Homing Torpedo Guidance Using a Hierarchical Deep Reinforcement Learning Framework by Kunchul Hwang, Jinwhan Kim

    Published 2025-01-01
    “…This paper proposes a novel Hierarchical Deep Reinforcement Learning (HRL) framework for wake homing torpedo guidance, applying the Discrete Event System Specification (DEVS) formalism to design high-level policies and reward shaping functions. …”
    Get full text
    Article
  5. 2465

    Digital Transformation in Lesson Planning: Automating Semester Learning Plans to Improve Pedagogical Effectiveness by Uswatun Hasanah, Annas Ribab Sibilana

    Published 2025-05-01
    “…This study aims to develop the RTFAC application to enhance the efficiency of the Semester Learning Plan (Rencana Pembelajaran Semester) formulation. …”
    Get full text
    Article
  6. 2466

    Investigation of the Application of Machine Learning Algorithms in Credit Risk Assessment of Medium and Micro Enterprises by Yujie Zhao

    Published 2024-01-01
    “…Micro and medium enterprises rely on small finance investments and returns to ensure smooth and prolonged functional processes. Due to improper planning and recovery, credit-based investments and lending sometimes lead to financial downfalls. …”
    Get full text
    Article
  7. 2467

    Deep Learning-Based Remote Sensing Image Analysis for Wildfire Risk Evaluation and Monitoring by Shiying Yu, Minerva Singh

    Published 2025-01-01
    “…To effectively monitor and predict fires, this project aims to develop deep learning models capable of processing multivariate remotely sensed global data in real time. …”
    Get full text
    Article
  8. 2468

    Information-entropy-driven generation of material-agnostic datasets for machine-learning interatomic potentials by Aparna P. A. Subramanyam, Danny Perez

    Published 2025-07-01
    “…Abstract In contrast to their empirical counterparts, machine-learning interatomic potentials (MLIAPs) promise to deliver near-quantum accuracy over broad regions of configuration space. …”
    Get full text
    Article
  9. 2469

    Employing SAE-GRU deep learning for scalable botnet detection in smart city infrastructure by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-04-01
    “…These findings enhance the understanding of IoT security by offering a scalable and resource-efficient solution for botnet detection. The functional investigation establishes a foundation for future research into adaptive security mechanisms that address emerging threats and highlights the practical potential of advanced deep learning techniques in safeguarding next-generation smart city ecosystems.…”
    Get full text
    Article
  10. 2470
  11. 2471

    A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication by Yunlong Wang, Jie Zhang, Guangjie Han, Dugui Chen

    Published 2025-05-01
    “…To address such challenges, we propose a lightweight chain authentication protocol for scalable IoT environments (LCAP-SIoT), which uses Physical Unclonable Functions (PUFs) and distributed authentication to secure communications, and a secure data collection algorithm, named LS-QMIX, which fuses the LCAP-SIoT and Q-learning Mixer (QMIX) algorithm to optimize the path planning and cooperation efficiency of the multi-UAV system. …”
    Get full text
    Article
  12. 2472

    Power Communication Network Recovery from Large-Scale Failures Based on Reinforcement Learning by Huibin JIA, Yonghe GAI, Baogang LI, Hongda ZHENG

    Published 2020-06-01
    “…Regarding this model, a heuristic algorithm based on reinforcement learning is proposed, in which the link recovery resources and the degree of importance of the damaged link in the failed service are taken into account to set the reward and penalty functions as well as the selection rules. …”
    Get full text
    Article
  13. 2473

    Deciphering Membrane Proteins Through Deep Learning Models by Revealing Their Locale Within the Cell by Mehwish Faiz, Saad Jawaid Khan, Fahad Azim, Nazia Ejaz, Fahad Shamim

    Published 2024-11-01
    “…Their precise localization is crucial for understanding their functions. Existing protein subcellular localization predictors are predominantly trained on globular proteins; their performance diminishes for membrane proteins, explicitly via deep learning models. …”
    Get full text
    Article
  14. 2474
  15. 2475

    Revolutionizing Lung Segmentation with Machine Learning: A Critical Review of Techniques in Medical Imaging by Momina Aisha, Moazma Ijaz, Nimra Tariq, Sehar Anjum, Sidra Siddiqui, Usman Hashmi

    Published 2024-12-01
    “…Consequently, automated lung segmentation methods utilizing Machine Learning (ML) and Deep Learning (DL) have emerged as essential alternatives. …”
    Get full text
    Article
  16. 2476

    scRL: Utilizing Reinforcement Learning to Evaluate Fate Decisions in Single-Cell Data by Zeyu Fu, Chunlin Chen, Song Wang, Junping Wang, Shilei Chen

    Published 2025-06-01
    “…The critic learns state-value functions that quantify fate intensity for each cell, while the actor traces optimal developmental routes across the manifold. …”
    Get full text
    Article
  17. 2477

    Integrated bioinformatics and machine learning reveal key genes and immune mechanisms associated with uremia by Zhiyue Sun, Zhiqiang Ding, Xiaoyang Guo, Jiangtao Li, Daoyuan Ding, Bo Wen

    Published 2025-07-01
    “…GSEA and immune infiltration analyses were conducted to explore functional pathways and immune relevance. ROC curves were used to evaluate the discriminatory power of the selected genes. …”
    Get full text
    Article
  18. 2478

    Leveraging Digital Library to Enhance Research and Learning Experience of College Students: An In-Depth Study by Chunying Yang

    Published 2022-01-01
    “…Thus, the digital library provides a platform to assist students to develop an inclination towards learning and emotional shaping. Its functional system thus serves both comprehensive and harmonious development of students. …”
    Get full text
    Article
  19. 2479

    Enhancing User Experiences in Digital Marketing Through Machine Learning: Cases, Trends, and Challenges by Alexios Kaponis, Manolis Maragoudakis, Konstantinos Chrysanthos Sofianos

    Published 2025-05-01
    “…The objective of the present study is to critically analyze the functional and ethical considerations of ML integration in DM and to evaluate its implications on data-driven personalization. …”
    Get full text
    Article
  20. 2480

    Classifying software security requirements into confidentiality, integrity, and availability using machine learning approaches by Taghreed Bagies

    Published 2024-11-01
    “…Security requirements are considered one of the most important non-functional requirements of software. The CIA (confidentiality, integrity, and availability) triad forms the basis for the development of security systems. …”
    Get full text
    Article