Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
based models » based modeling (Expand Search)
Showing 881 - 900 results of 1,002 for search '(((( data using algorithm ) OR ( based models algorithm ))) OR ( elements method algorithm ))', query time: 0.13s Refine Results
  1. 881
  2. 882
  3. 883

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 884

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier by JAIN, SWETA

    Published 2023
    “…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …”
    Get full text
    Get full text
  5. 885

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …”
    Get full text
  6. 886

    Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog... by Mutasim Baba, Fuad

    Published 2023
    “…The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
    Get full text
    Get full text
    Get full text
  7. 887

    Robustness testing of composed real-time systems by Fouchal, Hacène

    Published 2010
    “…In this paper, we suggest a methodology for testing robustness of Real-Time Component-Based Systems (RTCBS). A RTCBS system is described as a collection of components where each component is modeled as a Timed Input-Output Automaton (TIOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 888

    A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education by Abu Zitar, Raed

    Published 2022
    “…The main aim of this paper is to map the relationship between teaching practices and student learning based on emotional impact. Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
    Get full text
  9. 889

    Dataset built for Arabic Sentiment Analysis by AL MUKHAITI, AYESHA JUMAA SALEM

    Published 2016
    “…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
    Get full text
  10. 890

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …”
  11. 891

    A machine learning approach for localization in cellular environments by Abdallah, Ali A.

    Published 2018
    “…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 892

    Identification of phantom movements with an ensemble learning approach by Akhan Akbulut (17380285)

    Published 2022
    “…Our study demonstrated that the ensemble learning-based models resulted in higher accuracy in the detection of phantom movements. …”
  13. 893

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
  14. 894
  15. 895
  16. 896

    Systematic reviews in sentiment analysis: a tertiary study by Alexander Ligthart (14150871)

    Published 2022
    “…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
  17. 897

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 898

    Development of a cerebral aneurysm segmentation method to prevent sentinel hemorrhage by Yousra Regaya (17788964)

    Published 2023
    “…Here, we present a method combining a multiresolution and a statistical approach in two dimensional domain to segment cerebral aneurysm in which the Contourlet transform (CT) extracts the image features, while the Hidden Markov Random Field with Expectation Maximization (HMRF-EM) segments the image, based on the spatial contextual constraints. The proposed algorithm is tested on Three-Dimensional Rotational Angiography (3DRA) datasets; the average values of segmentation accuracy, DSC, FPR, FNR, specificity, and sensitivity, are found to be 99.72%, 93.52%, 0.07%, 5.23%, 94.77%, and 99.96%, respectively.…”
  19. 899

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC by Abbas, Nadine

    Published 2022
    “…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 900

    Design and implementation of a deep learning-empowered m-Health application by Akhan Akbulut (17380285)

    Published 2023
    “…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. The final phase displays the confidence rates on the mobile application. …”