Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
-
981
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
Published 2024“…To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
Get full text
Get full text
-
982
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…Identifying the minimally invasive biomarkers associated with dementia that could provide insights into the disease pathogenesis, improve early diagnosis, and facilitate the development of effective treatments is pressing. Proteomic studies have emerged as a promising approach for identifying the protein biomarkers associated with dementia. …”
-
983
Connectionist technique estimates of hydrogen storage capacity on metal hydrides using hybrid GAPSO-LSSVM approach
Published 2024“…Meanwhile, the estimation of hydrogen storage capacity will accelerate their development procedure. Machine learning algorithms can predict the correlation between the metal hydride chemical composition and its hydrogen storage capacity. …”
-
984
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
Get full text
-
985
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…In this matrix, each drug is represented by a vector of attributes from all other drugs. A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …”
Get full text
-
986
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…These benchmark datasets contain a variety of multivariate IoT attacks. The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
-
987
Discrimination between genuine and acted expressions using EEG signals and machine learning
Published 2019Get full text
doctoralThesis -
988
Common weaving approach in mainstream languages for software security hardening
Published 2013“…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
Get full text
Get full text
Get full text
article -
989
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
Published 2023Get full text
doctoralThesis -
990
Predicting Android Malware Using Evolution Networks
Published 2025“…In Cybersecurity, a main and persistent issue is the threat of malware. …”
Get full text
Get full text
Get full text
masterThesis -
991
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
Published 2025“…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …”
-
992
From Collatz Conjecture to chaos and hash function
Published 2023“…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …”
-
993
IoT-Based Sustainable Parking Lot
Published 2023“…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …”
Get full text
article -
994
Optimal Planning of Distributed Generators and Shunt Capacitors in Isolated Microgrids With Nonlinear Loads
Published 2020“…To consider this issue, a harmonic power flow tool tailored for planning applications is developed that takes into account the specific features of isolated microgrids. …”
Get full text
article -
995
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
Published 2019“…Over the past years, several approaches have been developed to create algorithmic music composers. Most existing solutions focus on composing music that appears theoretically correct or interesting to the listener. …”
Get full text
Get full text
Get full text
Get full text
article -
996
Parallelization of Stochastic Evolution
Published 2006“…In this work, the development of parallel algorithms for Stochastic Evolution, applied on multi-objective VLSI cell-placement problem is presented. …”
Get full text
masterThesis -
997
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
Published 2020“…Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
-
998
Cardiovascular health research priorities in the United Arab Emirates
Published 2023“…The top research priority areas were: development of evidence-based, customized algorithms for CVD prevention and in-hospital emergency interventions; the availability, accessibility, and affordability of CVD treatment and rehabilitation; identification of relationships between CVDs, lifestyle factors, and mental health; efficacy and constraints in the management of cardiac emergencies; and epidemiological studies that trace CVD in the UAE. …”
Get full text
article -
999
Parallelization of Iterative Heuristic for Performance-Driven Low-Power VLSI Standard Cell Placement.
Published 2003“…The motivation for Parallel CAD include faster runtimes, handling of larger problem sizes, and exploration of larger search space. In this work, the development of parallel algorithms for Tabu Search, applied on multi-objective VLSI cell-placement problem is presented. …”
Get full text
masterThesis -
1000
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…Equally important, integration of PM within a primary care setting, building a coalition of community champions through awareness and advocacy, finally, communicating PM value, patient engagement/empowerment and education/continued professional development programs of the healthcare workforce.…”