Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
161
Developing an online hate classifier for multiple social media platforms
Published 2020“…However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviting for users. Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …”
-
162
Communications in electronic textile systems
Published 2017“…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
Get full text
Get full text
Get full text
conferenceObject -
163
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
Get full text
Get full text
Get full text
article -
164
Soft Sensor for NOx Emission using Dynamical Neural Network
Published 2020“…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …”
Get full text
article -
165
Lung nodule classification utilizing support vector machines
Published 2002“…Many methods have been proposed in the literature such as neural network algorithms. Recently, support vector machines (SVMs) had received increasing attention for pattern recognition. …”
Get full text
Get full text
article -
166
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
-
167
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
168
Parallel processing
Published 2005“…The parallel genetic algorithm is based on a model of natural evolution. …”
Get full text
Get full text
Get full text
conferenceObject -
169
-
170
A new method of analysis for slender columns
Published 1991“…The method consists of a simple incremental-loading algorithm that traces the load-deflection curve at constant eccentricity of the axial load. …”
Get full text
Get full text
article -
171
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article -
172
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
173
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
174
Fracture and stability of strain-softening materials and structures
Published 1990“…The model is shown to realistically simulate the evolution of cracking and its localization. …”
Get full text
Get full text
Get full text
masterThesis -
175
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
Published 2023“…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
-
176
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
177
The Assessment and Allocation of Public Private Partnership Risks in the UAE
Published 2022Get full text
doctoralThesis -
178
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
Get full text
Get full text
article -
179
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
180
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis