Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
221
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
Published 2023“…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. …”
-
222
Investigation of Forming a Framework to shortlist contractors in the tendering phase
Published 2022“…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
Get full text
-
223
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
224
A clustering metaheuristic for large orienteering problems
Published 2022“…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …”
-
225
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
-
226
-
227
-
228
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
229
The Relation Between Respiratory & Acute Coronary Syndrome Using Data Mining Techniques
Published 2018“…The purpose of this study is to diagnose acute coronary syndrome using the widely available respiratory diagnosing tools and laboratory test results using data mining classification techniques (Decision tree, Gradient boosted tree, Neural Network, and Naïve Bias). …”
Get full text
-
230
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
231
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…<h3>Background and Motivations</h3><p dir="ltr">Physiological signals, such as the Photoplethysmogram (PPG) collected through wearable devices, consistently encounter significant motion artifacts. Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …”
-
232
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
-
233
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
Published 2023“…For the basic machine learning algorithms, LR, NB, SVM, RF, DT, MLP, AdaBoost, GBoost, and an ensemble model of machine learning classifiers were used. …”
Get full text
-
234
-
235
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
236
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
Published 2020“…The feature selection uses Grey Wolf Optimisation and Binary Search algorithms for choosing the best features out of the dataset. …”
Get full text
-
237
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…The most frequently used NLP techniques are found to be TF-IDF and word embeddings. …”
Get full text
Get full text
-
238
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
239
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
Published 2025“…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”
-
240
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
Published 2024“…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. …”