Showing 101 - 120 results of 210 for search '(( elements b algorithm ) OR ((( data code algorithm ) OR ( data detection algorithm ))))', query time: 0.13s Refine Results
  1. 101

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
  2. 102

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…They are sniffing the data traffic or causing service denial. In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. …”
    Get full text
  3. 103

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …”
  4. 104
  5. 105

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben Romdhane, Haifa

    Published 2023
    “…In this paper, the feasibility of satellite remote sensing in detecting and predicting locations of buried objects in the archaeological site of Saruq Al-Hadid, United Arab Emirates (UAE) was investigated. …”
    Get full text
  6. 106

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben-Romdhane, Haïfa

    Published 2023
    “…In this paper, the feasibility of satellite remote sensing in detecting and predicting locations of buried objects in the archaeological site of Saruq Al-Hadid, United Arab Emirates (UAE) was investigated. …”
    Get full text
    article
  7. 107

    Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar by Sankaran, Rajendran

    Published 2022
    “…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …”
    Get full text
    Get full text
    Get full text
    article
  8. 108

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
  9. 109

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…”
  10. 110

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates by Elmahdy, Samy

    Published 2020
    “…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …”
    Get full text
    article
  11. 111
  12. 112

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  13. 113

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …”
  14. 114

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 115

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  16. 116

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  17. 117
  18. 118

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …”
  19. 119

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring by Aya Nabil Sayed (17317006)

    Published 2024
    “…The DT technology enabled the creation of accurate virtual representations of users' physical environment, facilitating the optimization of energy-intensive devices and systems. Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
  20. 120