Search alternatives:
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
141
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
142
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
Get full text
Get full text
Get full text
Get full text
article -
143
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…The proposed GFT mechanism can be applied to any decision making problem within an uncertain environment. One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…”
Get full text
Get full text
Get full text
Get full text
article -
144
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
145
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
146
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
147
Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks
Published 2025“…We first formulate the general problem and solve it as a multi-objective optimization problem. …”
Get full text
Get full text
Get full text
masterThesis -
148
Communications in electronic textile systems
Published 2017“…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
Get full text
Get full text
Get full text
conferenceObject -
149
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
Get full text
Get full text
Get full text
article -
150
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
-
151
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
152
-
153
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article -
154
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
155
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
156
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
Published 2023“…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
-
157
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
158
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
159
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
Get full text
Get full text
article -
160
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis