Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
41
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
-
42
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…Hamad International Training Center not only offers formal resuscitation training like Advanced Life Support Obstetrics and Neonatal Resuscitation Program courses but also ensures the frontline care providers’ readiness for managing cardiac arrest events in Hamad Medical Corporation facilities through regular mock drills and monitoring the relevant Key Performance Indicators (KPIs). The study aimed to explore the impact of a multidisciplinary maternal resuscitation training program and the introduction of the maternal resuscitation algorithm pathway (Figure 1) on the relevant seven KPIs.…”
-
43
Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective
Published 2024“…It contributes to the literature by identifying the four OR innovations to typify the recent advances in SC optimization: new modeling conditions, new inputs, new decisions, and new algorithms. Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …”
-
44
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
Published 2021“…Data extracted from the included studies were synthesized narratively.…”
-
45
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…As far as e-government is concerned, the number of structured and unstructured webpages of electronic services has increased, making the repositories more complex and harder to analyse without considering semantic knowledge. Related studies have highlighted some challenges in the Arabic Semantic Web (SW) that adversely impact their results, for instance, data heterogeneity, and the differences in ontology construction approach. …”
Get full text
-
46
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
47
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…<h3>Objectives</h3><p dir="ltr">To investigate the association between birth weight to placental weight (BW/PW) ratio, and echocardiographic left ventricle (LV) morphology at birth, while accounting for other relevant perinatal factors.</p><h3>Methods</h3><p dir="ltr">A prospective cohort study was conducted on neonates at NewYork-Presbyterian Brooklyn Methodist Hospital from 2014 to 2018, categorized by their BW/PW percentile. …”
-
48
Performance Prediction Using Classification
Published 2019“…Principal component analysis and feature selection by weights using information gain ratio, Gini index, correlation and PCA is used to determine the relevant predictors of the datasets used. This study also addresses gaps in the current available literature on performance prediction, such as data imbalance and the use of Ensemble models. …”
Get full text
-
49
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
50
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
-
51
-
52
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
Get full text
-
53
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…This study aims to identify the technologies for user authentication and the opportunity for their transformation to mobile money transaction security despite having all the legally required data for a transaction. …”
-
54
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …”
-
55
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. …”
-
56
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…In this study, I conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM, CNN-BILSTM-LSTM, and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
-
57
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
Published 2025“…MethodsPreferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guideline was adapted for searching the PubMed and Scopus databases on ML use in TAVI outcomes prediction. Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
Get full text
Get full text
Get full text
article -
58
Novel biomarkers for potential risk stratification of drug induced liver injury (DILI)
Published 2019“…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …”
-
59
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …”
-
60