Showing 221 - 240 results of 420 for search '(((( data modeling algorithm ) OR ( involves cleaning algorithm ))) OR ( element data algorithm ))', query time: 0.12s Refine Results
  1. 221

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations by Mueen Uddin (4903510)

    Published 2025
    “…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
  2. 222

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  3. 223

    Stability and Numerical Solutions of Second Wave Mathematical Modeling on COVID-19 and Omicron Outbreak Strategy of Pandemic: Analytical and Error Analysis of Approximate Series So... by Ashwin Muniyappan (19570051)

    Published 2022
    “…<p dir="ltr">This paper deals with the mathematical modeling of the second wave of COVID-19 and verifies the current Omicron variant pandemic data in India. …”
  4. 224
  5. 225

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…The low R-squared scores obtained by the models are likely to be due to the low resolution of the NHANES data, particularly the dietary data. …”
  6. 226

    Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers by Yousef, Hibba

    Published 2024
    “…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
    Get full text
  7. 227
  8. 228

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  9. 229
  10. 230

    An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study by Ayman Hassan (14426412)

    Published 2024
    “…The data were distributed for training (35%), testing (35%), and validation (30%) of the prediction model.…”
  11. 231
  12. 232
  13. 233

    HVAC system attack detection dataset by Mariam Elnour (14147790)

    Published 2021
    “…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
  14. 234

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review by Avneet Kaur (712349)

    Published 2024
    “…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”
  15. 235

    Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications by Abdallah Falah Mohammad Aldwekat (22457821)

    Published 2025
    “…In interpreting these results, it is important to consider modelling uncertainties, including assumptions and data limitations.…”
  16. 236

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
  17. 237

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Adopting a random selection strategy would entail substantial problems due to the heterogeneity in terms of data quality, and computational and communication resources across the participants. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 238

    Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information by M. Ghoniem, Rania

    Published 2019
    “…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
    Get full text
    Get full text
  19. 239

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems by Khaled Dhibi (16891524)

    Published 2023
    “…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
  20. 240

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”