Search alternatives:
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
element » elements (Expand Search)
Showing 321 - 340 results of 391 for search '(((( data detection algorithm ) OR ( data including algorithm ))) OR ( element method algorithm ))', query time: 0.10s Refine Results
  1. 321

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
  2. 322

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services by ALBARGHOTHI, ALI BAHA’EDDIN

    Published 2018
    “…This stage is concerned with data extraction and validation from the Dubai government portal that includes the official profiles for more than 500 services. …”
    Get full text
  3. 323

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology by Ajay Vikram Singh (204056)

    Published 2023
    “…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
  4. 324
  5. 325

    A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies by Farideh Abdollahi (22303153)

    Published 2024
    “…A total of 13,554 studies were retrieved, of which 68 studies (including primary and secondary ones) were included in the final assessment. …”
  6. 326
  7. 327

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. To address this research gap, we collect a total of 197,566 comments from four platforms: YouTube, Reddit, Wikipedia, and Twitter, with 80% of the comments labeled as non-hateful and the remaining 20% labeled as hateful. …”
  8. 328

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  9. 329
  10. 330

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…The limitation of this research is that to use the framework to its full extent, it needs a huge database that includes data from numerous previous projects to be able to accurately predict the success rate of the upcoming project; however, if it could be regulated through governmental institutes then the database can be quickly collected within a relatively short period of time.…”
    Get full text
  11. 331
  12. 332
  13. 333

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
  14. 334
  15. 335

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  16. 336

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children by Jayakanth, Kunhoth

    Published 2023
    “…Three machine learning algorithms support vector machine (SVM), AdaBoost, and Random forest are employed to assess the performance of the CNN features and fused CNN features. …”
    Get full text
    Get full text
    Get full text
    article
  17. 337

    The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns by JA’AROUN, WAED YOUSEF

    Published 2024
    “…However, the adoption of AI also presents challenges, including potential biases in algorithms, privacy concerns, and the risk of an over-reliance on automated systems. …”
    Get full text
  18. 338

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features by Mariam Bahameish (19255789)

    Published 2024
    “…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …”
  19. 339

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children by Jayakanth Kunhoth (14158908)

    Published 2023
    “…Three machine learning algorithms support vector machine (SVM), AdaBoost, and Random forest are employed to assess the performance of the CNN features and fused CNN features. …”
  20. 340

    PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning by Gabriele Oligeri (14151426)

    Published 2022
    “…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …”