بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
system » systems (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
system » systems (توسيع البحث)
-
681
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
-
682
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
منشور في 2020"…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. Since the introduction of the Lee sigma filter in 1980, the various versions of the minimum mean square error (MMSE) filter were developed, focusing essentially on how to estimate the processed pixels. …"
احصل على النص الكامل
article -
683
Diagnostic test accuracy of AI-assisted mammography for breast imaging: a narrative review
منشور في 2025"…Artificial intelligence (AI), with its ability to process vast amounts of data and detect intricate patterns, offers a solution to the limitations of traditional mammography, including missed diagnoses and false positives. …"
-
684
FoGMatch
منشور في 2019"…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
685
-
686
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
687
A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies
منشور في 2024"…The fingerprinting and descriptors are two commonly approach for polymer featurization. In terms of algorithms, <u>neural networks</u> (NNs), random forest (RF), and gaussian process regression (GPR) are among the most extensively applied methods. …"
-
688
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
منشور في 2017"…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …"
احصل على النص الكامل
article -
689
-
690
Transformations for Variants of the Travelling Salesman Problem and Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
691
Data Endowment as a Digital Waqf: An Islamic Ethical Framework for AI Development
منشور في 2025"…<p dir="ltr">In the era of artificial intelligence (AI), data is often called the new oil—an essential asset for training algorithms and fueling intelligent systems. However, the ethical considerations surrounding this data’s ownership, use, and benefits remain contentious. …"
-
692
Data mining approach to predict student's selection of program majors
منشور في 2019"…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …"
احصل على النص الكامل
-
693
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We make our code publicly available for application in real software systems as well as for further development by online hate researchers.…"
-
694
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…The risk of cyberattacks targeting financial, military, and political systems has increased due to the wide use of technology. …"
-
695
Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration
منشور في 2025"…The study also highlights shortcomings of analyzing multiphase flows in mono-wet systems. Insights from this study can be used for improving pore network models and training machine learning algorithms.…"
-
696
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"