Showing 61 - 80 results of 195 for search '(( element method algorithm ) OR ((( detection model algorithm ) OR ( neural coding algorithm ))))', query time: 0.11s Refine Results
  1. 61

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems by Boukhari, Bahia

    Published 2019
    “…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 62

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  3. 63

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  4. 64

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 65

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 66

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. …”
    Get full text
  7. 67

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
    Get full text
    article
  8. 68

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. Subsequently, we used our best-performing model, a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) model that achieved an area under the receiver operating characteristic curve (AUC) score of 0.983 to detect toxicity. …”
  9. 69

    Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis by Naeem, Shahzeb

    Published 2025
    “…We also apply machine learning algorithms to establish a baseline for deepfake detection on this dataset, contributing to the detection of fraudulent sign language videos.…”
    Get full text
    article
  10. 70
  11. 71

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
    Get full text
  12. 72

    NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY by JINESH, PADIKKAPPARAMBIL

    Published 2022
    “…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
    Get full text
  13. 73
  14. 74
  15. 75

    Generic metadata representation framework for social-based event detection, description, and linkage by Abebe, Minale A.

    Published 2020
    “…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 76

    A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education by Abu Zitar, Raed

    Published 2022
    “…Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
    Get full text
  17. 77
  18. 78
  19. 79

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems by Ahmad K. Sleiti (14778229)

    Published 2022
    “…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
  20. 80