Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
element » elements (Expand Search)
-
1
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…The application of DL to cyberbullying detection problems within Arabic text classification can be considered a novel approach due to the complexity of the problem and the tedious process involved, besides the scarcity of relevant research studies.…”
Get full text
Get full text
-
2
-
3
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
4
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…The application of DL to cyberbullying detection problems within Arabic text classification can be considered a novel approach due to the complexity of the problem and the tedious process involved, besides the scarcity of relevant research studies.…”
Get full text
-
5
-
6
-
7
Unsupervised outlier detection in multidimensional data
Published 2022“…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …”
-
8
A Novel Hybrid Genetic-Whale Optimization Model for Ontology Learning from Arabic Text
Published 2019“…Second, a hybrid genetic-whale optimization algorithm was proposed to optimize ontology learning from Arabic text. …”
Get full text
Get full text
-
9
-
10
-
11
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
12
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…Gamma pulses from a 3" Na(TI) scintillation detector were captured as single and double pulses for the purpose of testing the peak detection algorithms. The pulse classification technique was tested successfully on a TMS320C6000 high performance floating-point processor yielding a reduction of the execution time to 2 msec…”
Get full text
Get full text
article -
13
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
14
A systematic review of text classification research based on deep learning models in Arabic language
Published 2020“…Classifying or categorizing texts is the process by which documents are classified into groups by subject, title, author, etc. …”
Get full text
Get full text
-
15
-
16
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text
-
17
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
18
-
19
-
20