Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level modeling » event modeling (Expand Search)
low algorithm » rd algorithm (Expand Search), colony algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level modeling » event modeling (Expand Search)
low algorithm » rd algorithm (Expand Search), colony algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
-
141
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. All possible combinations of the 10 best ranked features were used to generate SVM based prediction models. …”
-
142
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
Published 2024“…Linear regression analysis revealed that MLR and clozapine treatment were significantly correlated with the severity of schizophrenia symptoms. The Random Forest model, a supervised machine learning algorithm, efficiently differentiated between cases and controls and between TRS and NTRS, with accuracies of 86.87 % and 88.41 %, respectively. …”
-
143
An efficient approach for textual data classification using deep learning
Published 2022“…Next, we employ machine learning algorithms: logistic regression, random forest, K-nearest neighbors (KNN), and deep learning algorithms: long short-term memory (LSTM), artificial neural network (ANN), and gated recurrent unit (GRU) for classification. …”
-
144
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
Get full text
-
145
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…<p dir="ltr">This research aims to enhance the safety level and crash resiliency of targeted woven roving glass/epoxy composite material for various industry 4.0 applications. …”
-
146
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
147
Software defect prediction. (c2019)
Published 2019“…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). We compare our approach to 9 well known machine learning techniques and results show the advantages of our model over the other techniques. …”
Get full text
Get full text
Get full text
masterThesis -
148
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
Published 2024“…Bagged Ensemble Trees outperform other algorithms in estimating blood glucose level with a correlation coefficient of 0.90. …”
-
149
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…The four problems are modeled using incidence matrices and solved heuristically. …”
Get full text
Get full text
Get full text
Get full text
article -
150
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
Published 2023“…The accuracy level achieved in the prediction of multi-stage cyber attacks is 94.09% (Quest Model), 97.29% (Bayesian Network), and 99.09% (Neural Network). …”
-
151
A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks
Published 2022“…Moreover, in order to validate the proposed system, a new energy consumption dataset at appliance level is also designed through a measurement campaign carried out at Qatar University Energy Lab, namely, Qatar University dataset. …”
-
152
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
153
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
Get full text
-
154
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…However, the ECG can be interpreted differently by humans depending on the interpreter's level of training and experience, which could make diagnosis more difficult. …”
-
155
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…Studies reported and compared >1 machine learning (ML) model with high levels of accuracy. Support vector machine was the most reported (13/37, 35%), followed by random forest (12/37, 32%).…”
-
156
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
157
Depthwise Separable Convolutions and Variational Dropout within the context of YOLOv3
Published 2020“…However, these algorithms often impose prohibitive levels of memory and computational overhead, especially in resource-constrained environments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
158
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
159
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
Published 2021“…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
-
160
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…”
Get full text
masterThesis