Showing 621 - 640 results of 683 for search '(( data models algorithm ) OR ((( development based algorithm ) OR ( elements method algorithm ))))', query time: 0.12s Refine Results
  1. 621

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  2. 622

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…<p>A multi-modal transportation system of a city can be modeled as a multiplex network with different layers corresponding to different transportation modes. …”
  3. 623
  4. 624

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  5. 625

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
  6. 626

    Evolutionary support vector regression for monitoring Poisson profiles by Ali Yeganeh (16624998)

    Published 2023
    “…This paper aims to monitor Poisson profile monitoring problem in Phase II and develops a new robust control chart using support vector regression by incorporating some novel input features and evolutionary training algorithm. …”
  7. 627
  8. 628

    Machine Learning Techniques for Pharmaceutical Bioinformatics by SULTAN, AHMED ATTA AHMED

    Published 2018
    “…The study integrates knowledge visualization, analysis, as well as development of a predictive model based on the Drug-Drug Interactions (DDIs) as a complex network. …”
    Get full text
  9. 629

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 630
  11. 631

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 632

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben Romdhane, Haifa

    Published 2023
    “…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
    Get full text
  13. 633

    Predicting Android Malware Using Evolution Networks by Chahine, Joy

    Published 2025
    “…This issue requires the development of efficient solutions in order to keep up with the continuous evolution of malware. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 634

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting by Abdelkader Baggag (16864140)

    Published 2019
    “…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
  15. 635

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. Subsequently, we used our best-performing model, a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) model that achieved an area under the receiver operating characteristic curve (AUC) score of 0.983 to detect toxicity. …”
  16. 636

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  17. 637

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben-Romdhane, Haïfa

    Published 2023
    “…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
    Get full text
    article
  18. 638

    Cardiovascular health research priorities in the United Arab Emirates by Ghader, Nariman

    Published 2023
    “…The top research priority areas were: development of evidence-based, customized algorithms for CVD prevention and in-hospital emergency interventions; the availability, accessibility, and affordability of CVD treatment and rehabilitation; identification of relationships between CVDs, lifestyle factors, and mental health; efficacy and constraints in the management of cardiac emergencies; and epidemiological studies that trace CVD in the UAE. …”
    Get full text
    article
  19. 639

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis by Ashraf Gad (17040114)

    Published 2024
    “…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
  20. 640

    Comparative assessment of fracture risk among osteoporosis and osteopenia patients: a cross-sectional study by Snezana Tomasevic-Todorovic (5782682)

    Published 2018
    “…The assessment of the fracture risk was executed by applying the Fracture Assessment Risk (FRAX) index (an algorithm developed by the World Health Organization) based on clinical fracture risks or combination of clinical fracture risks and bone mineral density.…”