Search alternatives:
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
element » elements (Expand Search)
-
201
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
-
202
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
Get full text
-
203
Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles
Published 2024“…<p dir="ltr">The control and state estimation of Unmanned Aerial Vehicles (UAVs) provide significant challenges due to their complex and nonlinear dynamics, as well as uncertainties arising from factors such as sensor noise, wind gusts, and parameter fluctuations. Neural network-based methods tackle these problems by accurately approximating unknown nonlinearities through training on input-output data. …”
-
204
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
Get full text
-
205
A method for optimizing test bus assignment and sizing for system-on-a-chip
Published 2017“…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
206
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…This paper presents a new algorithm based on integrating genetic algorithms, tabu search and simulated annealing methods to solve the unit commitment problem. …”
Get full text
Get full text
article -
207
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
Get full text
-
208
A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms
Published 2007“…Numerous such algorithms have been devised, and many have found popularity in different domains. …”
Get full text
masterThesis -
209
A method for efficient NoC test scheduling using deterministic routing
Published 2017“…The method uses a deterministic routing algorithm that minimizes test time while avoiding blocking. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
210
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…The leading mathematical arithmetic operators' distributional nature is used by the AOA method. The picture histogram was used to construct the candidate solutions in the modified algorithms, which were then updated according to the algorithm's features. …”
Get full text
-
211
A simplified sliding‐mode control method for multi‐level transformerless DVR
Published 2022“…<p dir="ltr">Here, a finite-control-set sliding-mode control (FCS-SMC) method is proposed for single-phase three-level T-type inverter-based transformerless dynamic voltage restorers (TDVRs). …”
-
212
Evolutionary Game-Based Battery Scheduling: A Comparative Study for Prosumers in Smart Grids
Published 2025“…A comprehensive comparative analysis is conducted between the proposed EGT algorithm and established methods such as centralized optimization (CO), game theory (GT), and auction-based approaches. …”
-
213
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Due to the difficulty of manually detecting and categorizing vast volumes of electronic text data, conventional methods for recognizing and combating cyberbullying have not proven successful. …”
Get full text
-
214
VEGAWES: variational segmentation on whole exome sequencing for copy number detection
Published 2015“…We tested this algorithm on synthetic data and 100 Glioblastoma Multiforme primary tumor samples. …”
-
215
A family of minimum curvature variable-methods for unconstrained optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis -
216
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…In this paper, we provide an improved comparison method to deal with such resemblances. Our approach is based on the concept of tree edit distance, introducing the notion of commonality between sub-trees. …”
Get full text
Get full text
conferenceObject -
217
-
218
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
219
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
220
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…This study's dataset was sourced from the Kaggle machine learning repository, and it refers to data gathering from wearable IoT devices. The experimental outcomes demonstrate the proposed MCFS, NCA, and NSCP algorithms work more effectively than previous feature selection, clustering and classification algorithms, respectively, in terms of accuracy, sensitivity, specificity, precision, recall, f-measure and execution time. …”
Get full text