Showing 181 - 200 results of 452 for search '(( data modeling algorithm ) OR ((( element data algorithm ) OR ( elements presented algorithm ))))', query time: 0.13s Refine Results
  1. 181

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
    Get full text
  2. 182

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
    Get full text
    Get full text
  3. 183
  4. 184
  5. 185

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 186

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  7. 187

    Geographical Area Network—Structural Health Monitoring Utility Computing Model by Hasan Tariq (18131842)

    Published 2019
    “…Every gateway is routing the data to SHM-UCM servers running a geo-spatial patch health assessment and prediction algorithm. …”
  8. 188
  9. 189

    Modelling Exchange Rates during Currency Crisis using Neural Networks by Nasr, G. E.

    Published 2006
    “…Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 190

    Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques by Abu Zitar, Raed

    Published 2022
    “…Nowadays, learning-based modeling methods are utilized to build a precise forecast model for renewable power sources. …”
    Get full text
  11. 191
  12. 192

    A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation by Khaled Dhibi (16891524)

    Published 2021
    “…In the proposed FDD approach, named interval reduced kernel PCA (IRKPCA)-based Random Forest (IRKPCA-RF), the feature extraction and selection phase is performed using the IRKPCA models while the fault classification is ensured using the RF algorithm. …”
  13. 193
  14. 194
  15. 195
  16. 196
  17. 197

    Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models by EZZELDIN, KHALED MOHAMED KHALED

    Published 2024
    “…Additionally, the GRU-CNN hybrid model attained a notable accuracy of 90%. These findings establish the robustness and effectiveness of hybrid architectures in enhancing emotion recognition accuracy in Arabic speech data, presenting a novel approach for Arabic dialect sentiment analysis.…”
    Get full text
  18. 198

    Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta by Vaisali Chandrasekar (16904526)

    Published 2023
    “…Several dataset analysis models are utilised to study the data diversity. Further, this study demonstrates the application of neural network-based models to effectively predict the permeability. …”
  19. 199
  20. 200

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”