Showing 161 - 180 results of 427 for search '(((( develop post algorithm ) OR ( element data algorithm ))) OR ( data modelling algorithm ))', query time: 0.11s Refine Results
  1. 161

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 162

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    masterThesis
  3. 163

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  4. 164
  5. 165
  6. 166
  7. 167

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. As it is considered one of the most open and scalable interacting platforms of information, it successfully helps in the positive transfer of different kinds of data between devices in more significant and local operations of the industry. …”
  8. 168

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  9. 169

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning by Md Nazmul Islam Shuzan (21842426)

    Published 2024
    “…Furthermore, the proposed models were deployed in Amazon Web Server. The wristband is connected to an Android mobile application to collect real-time data and update the estimated glucose and diabetic severity every 10-seconds, which will allow the users to gain better control of their diabetic health.…”
  10. 170
  11. 171

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES by Al-Garni, Ahmed Z.

    Published 2020
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  12. 172

    Artificial intelligence models for predicting the mode of delivery in maternal care by Rawan AlSaad (14159019)

    Published 2025
    “…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …”
  13. 173

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
    Get full text
  14. 174

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
    Get full text
    Get full text
  15. 175
  16. 176
  17. 177
  18. 178

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 179

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  20. 180

    Geographical Area Network—Structural Health Monitoring Utility Computing Model by Hasan Tariq (18131842)

    Published 2019
    “…Every gateway is routing the data to SHM-UCM servers running a geo-spatial patch health assessment and prediction algorithm. …”