Showing 361 - 380 results of 391 for search '(( element mean algorithm ) OR ((( data code algorithm ) OR ( based learning algorithm ))))', query time: 0.11s Refine Results
  1. 361

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  2. 362

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test by Hasan T. Abbas (8115014)

    Published 2019
    “…Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. All possible combinations of the 10 best ranked features were used to generate SVM based prediction models. …”
  3. 363

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  4. 364

    Systematic reviews in sentiment analysis: a tertiary study by Alexander Ligthart (14150871)

    Published 2022
    “…In addition to the tertiary study, we also identified recent 112 deep learning-based sentiment analysis papers and categorized them based on the applied deep learning algorithms. …”
  5. 365

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We build our model using machine learning techniques in particular rule-based models. …”
    Get full text
    Get full text
    masterThesis
  6. 366
  7. 367

    Predicting Android Malware Using Evolution Networks by Chahine, Joy

    Published 2025
    “…With this aim, we introduce evolutionary networks, and particularly the Susceptible-Infectious-Susceptible (SIS) model, as a way to address the limitations of previous studies which are typically based on traditional machine learning models. The SIS model is usually used to represent disease spread between individuals in a population with transition between susceptible and infected states. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 368
  9. 369

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
  10. 370

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…<p dir="ltr">This research aims to enhance the safety level and crash resiliency of targeted woven roving glass/epoxy composite material for various industry 4.0 applications. Advanced machine learning algorithms are used in this study to figure out the complicated relationship between the crashworthiness parameters of the hexagonal composite ring specimens under lateral compressive, energy absorption, and failure modes. …”
  11. 371

    Tuning of a fuzzy logic power system stabilizer using geneticalgorithms by Abido, M.A.

    Published 1997
    “…It is shown that the performance of FLPSS can be improved significantly by incorporating a genetic based learning mechanism. The performance of the proposed HPSS under different disturbances and loading conditions is investigated. …”
    Get full text
    Get full text
    article
  12. 372
  13. 373
  14. 374

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis by Nisreen Said Amer (17984077)

    Published 2024
    “…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
  15. 375

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
  16. 376

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity by Sweidan, Zahraa

    Published 2020
    “…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 377

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
  18. 378

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…<p>Promoting healthy discourse on community-based online platforms like Reddit can be challenging, especially when conversations show ominous signs of toxicity. …”
  19. 379

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  20. 380

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations by Abbas, Nadine Fawaz

    Published 2017
    “…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
    Get full text
    Get full text
    Get full text
    masterThesis