Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
solution algorithm » auction algorithm (Expand Search), pollination algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
solution algorithm » auction algorithm (Expand Search), pollination algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
-
621
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
622
A Machine Learning Approach to Predicting Diabetes Complications
Published 2021Get full text
doctoralThesis -
623
Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context
Published 0024“…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …”
Get full text
-
624
An aspect-oriented framework for systematic security hardening of software
Published 2008“…Accordingly, we first propose an aspect-oriented and pattern-based approach for systematic security hardening. …”
Get full text
Get full text
Get full text
masterThesis -
625
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…Among the task-specific models, the SVM trained on word data achieved the highest accuracy of 91.7%. …”
Get full text
Get full text
Get full text
article -
626
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
627
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
Published 2025“…Leveraging FL enables efficient model training across diverse end-user applications while preserving data privacy. …”
-
628
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
-
629
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…Among the task-specific models, the SVM trained on word data achieved the highest accuracy of 91.7%. …”
-
630
-
631
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
Published 2020“…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
Get full text
Get full text
-
632
Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine
Published 2025“…Ethical considerations, such as safeguarding patient privacy, ensuring data security, and mitigating algorithmic bias, underscore the importance of responsible AI integration. …”
-
633
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
Published 2024“…However, limited datasets in affective computing and healthcare research can lead to inaccurate conclusions regarding the ML model performance. This study employed supervised learning algorithms to classify stress and relaxation states using HRV measures. …”
-
634
Humanizing AI in medical training: ethical framework for responsible design
Published 2023“…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …”
-
635
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text
-
636
Scatter search technique for exam timetabling
Published 2011“…This approach is based on maintaining and evolving a population of solutions. …”
Get full text
Get full text
Get full text
article -
637
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
638
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
Published 2011“…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
article -
639
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
Get full text
Get full text
Get full text
article -
640
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…The main aim was to predict the initial leukemia disease. Machine learning algorithms such as decision tree (DT), naive bayes (NB), random forest (RF), gradient boosting machine (GBM), linear regression (LinR), support vector machine (SVM), and novel approach based on the combination of Logistic Regression (LR), DT and SVM named as ensemble LDSVM model. …”