Showing 421 - 440 results of 441 for search '(((( data code algorithm ) OR ( data modeling algorithm ))) OR ( elements mould algorithm ))*', query time: 0.10s Refine Results
  1. 421

    Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM) by AL SHOUBAKI, HAMZA YOUNIS

    Published 2024
    “…We also explore a range of algorithms, including traditional classifiers and deep learning models, to determine and select the most suitable and accurate models of identifying poets' names from the verses. …”
    Get full text
  2. 422

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 423

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
  4. 424

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben Romdhane, Haifa

    Published 2023
    “…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
    Get full text
  5. 425

    Precision nutrition: A systematic literature review by Daniel Kirk (17302798)

    Published 2021
    “…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …”
  6. 426
  7. 427

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. Subsequently, we used our best-performing model, a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) model that achieved an area under the receiver operating characteristic curve (AUC) score of 0.983 to detect toxicity. …”
  8. 428

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
  9. 429

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  10. 430

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben-Romdhane, Haïfa

    Published 2023
    “…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
    Get full text
    article
  11. 431

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  12. 432

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  13. 433
  14. 434

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar (22046597)

    Published 2024
    “…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …”
  15. 435
  16. 436
  17. 437

    Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis by Jithin Kalathikudiyil Sreedharan (18268894)

    Published 2024
    “…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
  18. 438

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
  19. 439
  20. 440

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”