Search alternatives:
sampling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
sampling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
81
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
82
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…In this paper, an enhanced binary version of the Rat Swarm Optimizer (RSO) is proposed to deal with Feature Selection (FS) problems. FS is an important data reduction step in data mining which finds the most representative features from the entire data. …”
-
83
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…The collection of digital images for monitoring underwater habitats, such as seagrass meadows, has increased significantly as recent progress in imaging technology has made it easier to collect high-resolution data. …”
-
84
EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach
Published 2019“…The proposed model achieves better classification accuracy compared to the recently reported work when validated on SJTU SEED and DEAP data sets. …”
-
85
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
Published 2022Get full text
doctoralThesis -
86
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
Published 2022“…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …”
Get full text
-
87
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…<p dir="ltr">In the recent era, the cancellable approach of template protection is a widely applicable and secure method in fingerprint authentication systems. …”
-
88
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
Published 2024“…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
-
89
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. In the current study, we utilize RNA sequencing data to identify lncRNA-based biomarkers associated with TNBC, ER+ subtypes, and normal breast tissue. …”
-
90
Inferential sensing techniques in industrial applications
Published 0007“…Inferential sensing techniques have been gaining momentum recently as viable alternatives to hardware sensors (i.e. …”
Get full text
masterThesis -
91
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. …”
Get full text
article -
92
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
-
93
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
94
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
95
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
96
-
97
Various Faults Classification of Industrial Application of Induction Motors Using Supervised Machine Learning: A Comprehensive Review
Published 2025“…This paper presents a comprehensive review of recent techniques proposed in the literature for bearing, stator winding and broken rotor bar faults with machine learning algorithms focused on fault detection for numerous faults. …”
-
98
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
article -
99
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…<div><p>Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolution is hampered by cybersecurity threats like spoofing, denial of service (DoS), distributed denial of service (DDoS) attacks, intrusions, malwares, authentication problems or other fatal attacks. …”
-
100
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”