Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
based models » based modeling (Expand Search)
element » elements (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
based models » based modeling (Expand Search)
element » elements (Expand Search)
-
881
Improving the security of SNMP in wireless networks
Published 2017“…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
882
Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier
Published 2023“…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …”
Get full text
Get full text
-
883
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …”
Get full text
-
884
Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog...
Published 2023“…The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
Get full text
Get full text
Get full text
-
885
Robustness testing of composed real-time systems
Published 2010“…In this paper, we suggest a methodology for testing robustness of Real-Time Component-Based Systems (RTCBS). A RTCBS system is described as a collection of components where each component is modeled as a Timed Input-Output Automaton (TIOA). …”
Get full text
Get full text
Get full text
Get full text
article -
886
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…The main aim of this paper is to map the relationship between teaching practices and student learning based on emotional impact. Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
Get full text
-
887
Dataset built for Arabic Sentiment Analysis
Published 2016“…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
Get full text
-
888
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …”
-
889
A machine learning approach for localization in cellular environments
Published 2018“…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
890
Identification of phantom movements with an ensemble learning approach
Published 2022“…Our study demonstrated that the ensemble learning-based models resulted in higher accuracy in the detection of phantom movements. …”
-
891
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
Published 2022“…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
-
892
-
893
-
894
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
-
895
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
896
A fine-grained XML structural comparison approach
Published 2007“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
897
Development of a cerebral aneurysm segmentation method to prevent sentinel hemorrhage
Published 2023“…Here, we present a method combining a multiresolution and a statistical approach in two dimensional domain to segment cerebral aneurysm in which the Contourlet transform (CT) extracts the image features, while the Hidden Markov Random Field with Expectation Maximization (HMRF-EM) segments the image, based on the spatial contextual constraints. The proposed algorithm is tested on Three-Dimensional Rotational Angiography (3DRA) datasets; the average values of segmentation accuracy, DSC, FPR, FNR, specificity, and sensitivity, are found to be 99.72%, 93.52%, 0.07%, 5.23%, 94.77%, and 99.96%, respectively.…”
-
898
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
899
Design and implementation of a deep learning-empowered m-Health application
Published 2023“…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. The final phase displays the confidence rates on the mobile application. …”
-
900
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”