Showing 381 - 400 results of 418 for search '(((( implementing a algorithm ) OR ( elements ppm algorithm ))) OR ( level coding algorithm ))', query time: 0.13s Refine Results
  1. 381
  2. 382
  3. 383

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…However, they are not highly effective in improving results and are frequently employed by doctors for cancer diagnosis. This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  4. 384

    Exploring AI Conversational Chatbot UX Design: Insights from High School by Suha Khalil Assayed

    Published 2025
    “…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …”
    Get full text
  5. 385

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  6. 386

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Moreover, we propose a set of effective algorithms to generate solutions for relatively large-scale network scenarios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 387
  8. 388

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. …”
    Get full text
  9. 389

    Cooperative Caching Policy in Fog Computing for Connected Vehicles by Ghazleh, Ali

    Published 2023
    “…In this thesis, we implemented cooperation between a Deep Reinforcement Learning (DRL) model and Federated Learning to improve caching in Connected Vehicles connected to fog nodes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 390

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”
    Get full text
    Get full text
    Get full text
    article
  11. 391

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  12. 392

    Using C++ to Calculate SO(10) Tensor Couplings by Bhagwagar, Azadan

    Published 2021
    “…Therefore, there exists an opportunity to leverage the abilities of computer software in order to algorithmically perform these calculations on demand. …”
    Get full text
    article
  13. 393

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle by Reza Jafari (3494018)

    Published 2025
    “…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …”
  14. 394

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
  15. 395
  16. 396

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…To achieve this goal, we present a formal specification for GIMPLE weaving and the implementation strategies of the proposed weaving semantics. …”
    Get full text
    Get full text
    Get full text
    article
  17. 397

    FPGA-Based Network Traffic Classification Using Machine Learning by Elnawawy, Mohammed

    Published 2020
    “…The results of the conducted experiments indicate that random forest outperforms other algorithms achieving a maximum accuracy of 98.5% and an F-score of 0.932. …”
    Get full text
    article
  18. 398

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques by Arifa Zahir (20748764)

    Published 2024
    “…Various Deep Learning algorithms, including Convolution Neural Network (CNN), LeNet, and Inception-V3 are implemented to classify the records and extract various patterns. …”
  19. 399

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…It had an impressive accuracy of 99.99%, and it could mitigate DDoS attacks in less than 3 s. We conducted a comparative analysis of various models and algorithms used in the related works. …”
  20. 400

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”