Artykuły w czasopismach na temat „ML TECHNIQUES”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „ML TECHNIQUES”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Jeevana, P., T. Nandini, D. Srilekha, G. Dinesh i Mrs Archana. "Diabetic Prediction using ML Techniques". YMER Digital 21, nr 04 (30.04.2022): 585–93. http://dx.doi.org/10.37896/ymer21.04/59.
Pełny tekst źródłaVenkata Vara Prasad, D., P. Senthil Kumar, Lokeswari Y. Venkataramana, G. Prasannamedha, S. Harshana, S. Jahnavi Srividya, K. Harrinei i Sravya Indraganti. "Automating water quality analysis using ML and auto ML techniques". Environmental Research 202 (listopad 2021): 111720. http://dx.doi.org/10.1016/j.envres.2021.111720.
Pełny tekst źródłaKosinska, Joanna, i Maciej Tobiasz. "Detection of Cluster Anomalies With ML Techniques". IEEE Access 10 (2022): 110742–53. http://dx.doi.org/10.1109/access.2022.3216080.
Pełny tekst źródłaDerangula, Sirisha. "Identification of phishing websites using ML techniques". International Journal of Communication and Information Technology 1, nr 2 (1.07.2020): 28–32. http://dx.doi.org/10.33545/2707661x.2020.v1.i2a.16.
Pełny tekst źródłaNanajkar, Jyotsna, Mayuresh Warang, Pratik Suthar, Shivam Shinde i Atharv Pawar. "DDoS Attack Detection Using ML/DL Techniques". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 01 (8.01.2024): 1–10. http://dx.doi.org/10.55041/ijsrem27967.
Pełny tekst źródłaKumar, Sachin, i Subhasree Bhattacharjee. "REVIEW OF AI/ML TECHNIQUES ON COVID-19". International Journal of Engineering Applied Sciences and Technology 7, nr 5 (1.09.2022): 116–18. http://dx.doi.org/10.33564/ijeast.2022.v07i05.020.
Pełny tekst źródłaAbuzaid, Nawal. "Image SPAM Detection Using ML and DL Techniques". International Journal of Advances in Soft Computing and its Applications 14, nr 1 (28.03.2022): 227–43. http://dx.doi.org/10.15849/ijasca.220328.15.
Pełny tekst źródłaT., Logeswari. "Performance Analysis of Ml Techniques for Spam Filtering". International Research Journal on Advanced Science Hub 2, Special Issue ICIES 9S (3.11.2020): 64–69. http://dx.doi.org/10.47392/irjash.2020.161.
Pełny tekst źródłaKore, Rahul C., Prachi Ray, Priyanka Lade i Amit Nerurkar. "Legal Document Summarization Using Nlp and Ml Techniques". International Journal of Engineering and Computer Science 9, nr 05 (20.05.2020): 25039–46. http://dx.doi.org/10.18535/ijecs/v9i05.4488.
Pełny tekst źródłaSethuraman, Sriram, V. S. Nithya i D. Venkata Narayanababu Laveti. "Noniterative Content-Adaptive Distributed Encoding Through ML Techniques". SMPTE Motion Imaging Journal 127, nr 9 (październik 2018): 50–55. http://dx.doi.org/10.5594/jmi.2018.2862647.
Pełny tekst źródłaAkula, Roopesh. "Fraud identification of credit card using ML techniques". International Journal of Computing and Artificial Intelligence 1, nr 2 (1.07.2020): 31–33. http://dx.doi.org/10.33545/27076571.2020.v1.i2a.15.
Pełny tekst źródłaS, Sabarinath, Thirumalaivasan R, Shiam S, Mohamed Aashik M. S, K. Sudhakar i Dr P. Rama. "Analysis of Stock Price Prediction Using ML Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 4 (30.04.2023): 1533–37. http://dx.doi.org/10.22214/ijraset.2023.50378.
Pełny tekst źródłaReddy, N. Narasimha, i G. M. Vema Reddy. "DDoS Attack Detection in SDN using ML Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 10 (31.10.2023): 2035–38. http://dx.doi.org/10.22214/ijraset.2023.56350.
Pełny tekst źródłaDrabeck, Lawrence, Buvana Ramanan, Thomas Woo i Troy Cauble. "Automated Techniques for Creating Speech Corpora from Public Data Sources for ML Training". International Journal of Machine Learning and Computing 10, nr 1 (styczeń 2020): 1–9. http://dx.doi.org/10.18178/ijmlc.2020.10.1.890.
Pełny tekst źródłaKasture, Pradnya. "DDoS Attack Detection using ML". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 6421–24. http://dx.doi.org/10.22214/ijraset.2023.53133.
Pełny tekst źródłaSanapala, Anuradha, B. Jaya Lakshmi, K. Sandhya Rani Kundra i K. B. Madhuri. "Air Pollution Detection and Control System Using ML Techniques". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 4 (4.05.2023): 219–25. http://dx.doi.org/10.17762/ijritcc.v11i4.6442.
Pełny tekst źródłaMahesh T R i Vinoth Kumar. "Early Detection of Cancer using Machine Learning (ML) Techniques". International Journal of Information Technology, Research and Applications 2, nr 1 (31.03.2023): 14–21. http://dx.doi.org/10.59461/ijitra.v2i1.24.
Pełny tekst źródłaCalabe P S, Prabha R i Veena Potdar. "Cardiac ailment recognition using ML techniques in E-healthcare". World Journal of Advanced Research and Reviews 17, nr 1 (30.01.2023): 302–7. http://dx.doi.org/10.30574/wjarr.2023.17.1.0010.
Pełny tekst źródłaBavarva, Sneh, Kalpesh Senva i Priyank Bhojak. "SQLI Attack: An Approach using ML and Hybrid Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 10 (31.10.2023): 1244–49. http://dx.doi.org/10.22214/ijraset.2023.56190.
Pełny tekst źródła詹木, 子豪. "Translation Techniques of Highway Engineering Price Foundation". Modern Linguistics 06, nr 03 (2018): 391–96. http://dx.doi.org/10.12677/ml.2018.63042.
Pełny tekst źródłaChoubey, Shubham. "Diabetes Prediction Using ML". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 4209–12. http://dx.doi.org/10.22214/ijraset.2023.54415.
Pełny tekst źródłaDevi, P. Rama, Srujitha Meesala, Ramya Reddy, Kushal Senapathi i Udaya Kolala. "Anticipating Consumer Demand using ML". International Journal for Research in Applied Science and Engineering Technology 11, nr 4 (30.04.2023): 1053–58. http://dx.doi.org/10.22214/ijraset.2023.50283.
Pełny tekst źródłaPrasad Gundu, Ram, P. Pardhasaradhi, S. Koteswara Rao i V. Gopi Tilak. "TOA-based source localization using ML estimation". International Journal of Engineering & Technology 7, nr 2.7 (18.03.2018): 742. http://dx.doi.org/10.14419/ijet.v7i2.7.10936.
Pełny tekst źródłaScheider, DM, R. Alhalel, M. Bourke, A. Elfant, P. Kortan i GB Haber. "Endoscopic retrieval techniques for cable fractures complicating mechanical lithotripsy (ML)". Gastrointestinal Endoscopy 41, nr 4 (kwiecień 1995): 413. http://dx.doi.org/10.1016/s0016-5107(05)80508-5.
Pełny tekst źródłaChandra Mouli, K., B. Indupriya, D. Ushasree, Ch V. Raghavendran, Babita Rawat i Bhukya Madhu. "Network Intrusion Detection using ML Techniques for Sustainable Information System". E3S Web of Conferences 430 (2023): 01064. http://dx.doi.org/10.1051/e3sconf/202343001064.
Pełny tekst źródłaAhire, Prof Pritam. "A Survey on Malware detection using ML". International Journal for Research in Applied Science and Engineering Technology 10, nr 1 (31.01.2022): 314–24. http://dx.doi.org/10.22214/ijraset.2022.39813.
Pełny tekst źródłaWarghane, Atharva, Rohit Khawse, Lavanya Shinde, Kriti Deep Singh, Mohini Mokadam i Shailesh Kurzadkar. "FREE GUY- A Hand Gesture Game Based on ML". International Journal of Computer Science and Mobile Computing 11, nr 2 (28.02.2022): 23–26. http://dx.doi.org/10.47760/ijcsmc.2022.v11i02.003.
Pełny tekst źródłaArslan, Ayse. "Mitigation Techniques to Overcome Data Harm in Model Building for ML". International Journal of Artificial Intelligence & Applications 13, nr 1 (31.01.2022): 73–82. http://dx.doi.org/10.5121/ijaia.2022.13105.
Pełny tekst źródłaLi, Yuliang, Xiaolan Wang, Zhengjie Miao i Wang-Chiew Tan. "Data augmentation for ML-driven data preparation and integration". Proceedings of the VLDB Endowment 14, nr 12 (lipiec 2021): 3182–85. http://dx.doi.org/10.14778/3476311.3476403.
Pełny tekst źródłaJadhav, Neha, Prof Mrs M. E. Sanap, Samiksha Katore, Srushti Mahadik i Akanksha Shendage. "Malware Detection and Prevention Using ML". International Journal for Research in Applied Science and Engineering Technology 11, nr 11 (30.11.2023): 356–57. http://dx.doi.org/10.22214/ijraset.2023.56514.
Pełny tekst źródłaBhavani, Mudrakola, i Podila Mounika. "Educational Data Mining using ML". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 4940–47. http://dx.doi.org/10.22214/ijraset.2023.54210.
Pełny tekst źródłaALGorain, Fahad T., i John A. Clark. "Covering Arrays ML HPO for Static Malware Detection". Eng 4, nr 1 (9.02.2023): 543–54. http://dx.doi.org/10.3390/eng4010032.
Pełny tekst źródłaPatil, Vijeeta, Pratima Ghattarki i Vilas Naik. "A Comparative Study of Different ML Techniques for Medical Image Analysis". Journal of Image Processing and Artificial Intelligence 7, nr 1 (22.02.2021): 21–31. http://dx.doi.org/10.46610/joipai.2021.v07i01.003.
Pełny tekst źródłaPatil, Anuj, Anklesh Patil i Jivan Devhare. "Cyberbullying Detection in social media Using Supervised ML & NLP Techniques". International Journal for Research in Applied Science and Engineering Technology 10, nr 8 (31.08.2022): 469–71. http://dx.doi.org/10.22214/ijraset.2022.46219.
Pełny tekst źródłaJayakumar, D., S. Srinivasan, G. Meghana, B. Sai Harika i K. Yasaswini Priya. "An Eminent Spam Noticing Methodology for IOT Gadgets Using ML Techniques". Revista Gestão Inovação e Tecnologias 11, nr 2 (18.06.2021): 2156–66. http://dx.doi.org/10.47059/revistageintec.v11i2.1857.
Pełny tekst źródłaArunkumar, A., i D. Surendran. "Autism Spectrum Disorder Diagnosis Using Ensemble ML and Max Voting Techniques". Computer Systems Science and Engineering 41, nr 1 (2022): 389–404. http://dx.doi.org/10.32604/csse.2022.020256.
Pełny tekst źródłaAli, Rao Faizan, Amgad Muneer, Ahmed Almaghthawi, Amal Alghamdi, Suliman Mohamed Fati i Ebrahim Abdulwasea Abdullah Ghaleb. "BMSP-ML: big mart sales prediction using different machine learning techniques". IAES International Journal of Artificial Intelligence (IJ-AI) 12, nr 2 (1.06.2023): 874. http://dx.doi.org/10.11591/ijai.v12.i2.pp874-883.
Pełny tekst źródłaRastogi, Rohit, Priyanshu Arora, Luv Dhamija i Rajat Srivastava. "Statistical Analysis of Online Voting System Through Blockchain and ML Techniques". International Journal of Cyber Behavior, Psychology and Learning 12, nr 1 (1.01.2022): 1–19. http://dx.doi.org/10.4018/ijcbpl.313947.
Pełny tekst źródłaBadi, Haitham, Sabah Hasan Hussein i Sameem Abdul Kareem. "RETRACTED ARTICLE: Feature extraction and ML techniques for static gesture recognition". Neural Computing and Applications 25, nr 3-4 (18.01.2014): 733–41. http://dx.doi.org/10.1007/s00521-013-1540-6.
Pełny tekst źródłaA. Alsemmeari, Rayan, Mohamed Yehia Dahab, Badraddin Alturki i Abdulaziz A. Alsulami. "Priority Detector and Classifier Techniques Based on ML for the IoMT". Computers, Materials & Continua 76, nr 2 (2023): 1853–70. http://dx.doi.org/10.32604/cmc.2023.038589.
Pełny tekst źródłaDr., Sudalaimani, i Revathi L.V. "Fault Diagnosis of Wind Turbines using Scada Data by ML Techniques". International Journal of Innovative Research in Advanced Engineering 10, nr 07 (31.07.2023): 549–57. http://dx.doi.org/10.26562/ijirae.2023.v1007.19.
Pełny tekst źródłaNagy, Naya, Malak Aljabri, Afrah Shaahid, Amnah Albin Ahmed, Fatima Alnasser, Linda Almakramy, Manar Alhadab i Shahad Alfaddagh. "Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis". Sensors 23, nr 7 (26.03.2023): 3467. http://dx.doi.org/10.3390/s23073467.
Pełny tekst źródłaVernekar, Pratham, Aniruddha Singh i Dr Kailash Patil. "Pothole and Wet Surface Detection Using Pretrained Models and ML Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 3 (31.03.2023): 626–33. http://dx.doi.org/10.22214/ijraset.2023.49489.
Pełny tekst źródłaPandey, Prachi, i Abhijitha Bandaru. "Enhancing predictive accuracy of asset returns by experimenting with ML techniques". SHS Web of Conferences 169 (2023): 01062. http://dx.doi.org/10.1051/shsconf/202316901062.
Pełny tekst źródłaVishwakarma, Ashish, i Deepak Pancholi. "Performance Analysis of V-Blast Spatial Multiplexing with Ml and MMSE Equalisation Techniques using Psk Modulation". International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (31.08.2018): 2302–5. http://dx.doi.org/10.31142/ijtsrd14419.
Pełny tekst źródłaSingh, Balraj, Aadil Shaikh, Priyanka Jadhav, Rajneesh Chaturvedi i Prof Ankit Sanghvi. "Cinephiles Integration System using ML". International Journal for Research in Applied Science and Engineering Technology 11, nr 4 (30.04.2023): 3349–53. http://dx.doi.org/10.22214/ijraset.2023.50947.
Pełny tekst źródłaSundaram, Karthik Trichur. "Digital Transformation with AI/ML & Cybersecurity". International Journal of Computer Science and Mobile Computing 11, nr 11 (30.11.2022): 1–3. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.001.
Pełny tekst źródłaSanthiya, S., N. Abinaya, P. Jayadharshini, S. Priyanka, S. Keerthika i C. Sharmila. "Orthopedic patient analysis using machine learning techniques". Journal of Physics: Conference Series 2664, nr 1 (1.12.2023): 012004. http://dx.doi.org/10.1088/1742-6596/2664/1/012004.
Pełny tekst źródłaKandula, Lohith Ranganatha Reddy, T. Jaya Lakshmi, Kalavathi Alla i Rohit Chivukula. "An Intelligent Prediction of Phishing URLs Using ML Algorithms". International Journal of Safety and Security Engineering 12, nr 3 (30.06.2022): 381–86. http://dx.doi.org/10.18280/ijsse.120312.
Pełny tekst źródłaMeltzer, Jed A. "Localizing the component processes of lexical access using modern neuroimaging techniques". Mental Lexicon 7, nr 1 (8.06.2012): 91–118. http://dx.doi.org/10.1075/ml.7.1.05mel.
Pełny tekst źródła