Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
waste processing » image processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
waste processing » image processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
161
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…In the present article, we proposed a novel transfer learning-based predictor called, Lung-EffNet for lung cancer classification. …”
-
162
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Published 2023“…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
Get full text
Get full text
Get full text
article -
163
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
-
164
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
165
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
166
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
Published 2022“…The two movies are Wahed Tani which translates to (someone else) and Amahom which translate to (their uncle), Three datasets were employed, and several categorization models were compared across them. Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …”
Get full text
-
167
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
168
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
169
MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network
Published 2022“…Because the diagnosis of many neurological diseases is heavily reliant on clean EEG data, it is critical to eliminate motion artifacts from motion-corrupted EEG signals using reliable and robust algorithms. Although a few deep learning-based models have been proposed for the removal of ocular, muscle, and cardiac artifacts from EEG data to the best of our knowledge, there is no attempt has been made in removing motion artifacts from motion-corrupted EEG signals: In this paper, a novel 1D convolutional neural network (CNN) called multi-layer multi-resolution spatially pooled (MLMRS) network for signal reconstruction is proposed for EEG motion artifact removal. …”
-
170
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
Get full text
-
171
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article