Search alternatives:
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
-
241
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
Get full text
Get full text
Get full text
article -
242
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…The main aim of this paper is to map the relationship between teaching practices and student learning based on emotional impact. Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
Get full text
-
243
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
244
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
245
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
Published 2023“…In this regard, our study aims to predict the permeability of molecules across the placental barrier. Based on publicly available datasets, several machine learning models are comprehensively analysed across different fingerprints and toolkits to find the best suitable models. …”
-
246
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
247
Applying urban parametric design optimisation processes to a hot climate: Case study of the UAE
Published 2014“…An in-depth analysis was carried out between the base case and the optimised case. Future recommendations were drawn based on the findings and results. …”
Get full text
-
248
A low degree vertex elimination with high degree vertex selection heuristic for strongly connected dominating and absorbent sets in wireless Ad-Hoc networks. (c2011)
Published 2016“…Experimental results show that our approach outperforms all previously known algorithms for the SCDAS problem.…”
Get full text
Get full text
masterThesis -
249
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
-
250
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…Based on our simulation findings, our strategy surpasses the VanillaF selection approach in terms of maximizing both the revenues of the client devices and accuracy of the global federated learning model.…”
Get full text
Get full text
Get full text
masterThesis -
251
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
Get full text
Get full text
-
252
Enhancing e-learning through AI: advanced techniques for optimizing student performance
Published 2024“…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …”
-
253
Creating and detecting fake reviews of online products
Published 2022“…We show that a machine classifier can accomplish this goal near-perfectly, whereas human raters exhibit significantly lower accuracy and agreement than the tested algorithms. The model was also effective on detected human generated fake reviews. …”
-
254
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
Published 2024“…This study employed supervised learning algorithms to classify stress and relaxation states using HRV measures. …”
-
255
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
Published 2023“…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
-
256
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
Published 2025“…A comparative evaluation of three FL algorithms (FedAvg, FedProx, Mime-lite) identifies the most suitable aggregation strategy. …”
-
257
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…This study not only examines the well-known challenges such as limited availability of data but provides a novel, structured taxonomy of deep learning techniques tailored for the monitoring of seagrass, highlighting their unique advantages and limitations within diverse marine environments. By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
-
258
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis -
259
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
260
A comparative analysis to forecast carbon dioxide emissions
Published 2022“…This leads to the second step, which involves formulating the multivariate time series CO<sub>2</sub> emissions forecasting challenges considering its influential factors. Based on multivariate time series prediction, four deep learning algorithms are analyzed in this work, those are convolution neural network (CNN), CNN long short-term memory (CNN–LSTM), long short-term memory (LSTM), and dense neural network (DNN). …”