Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
41
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
42
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
43
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…We also incorporate a corner detection algorithm to detect significant points which are necessary to capture a pleasant looking spline fitting for shapes such as fonts. …”
Get full text
Get full text
article -
44
A comparative study of regression testing methods. (c1996)
Published 1996Get full text
Get full text
masterThesis -
45
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
46
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…DL approaches provide highly accurate predictive models for detecting cyberbullying. The first contribution of this thesis is conducting an in-depth meta-analysis of existing evaluation methods, classification techniques, and datasets related to ML for cyberbullying problems. …”
Get full text
-
47
-
48
Detection of statistically significant network changes in complex biological networks
Published 2017“…The proposed procedure exploits a more effective model selection criteria to generate <i>p</i>-values for statistical significance and is more efficient in terms of computational time and prediction accuracy than literature methods. Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
49
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
50
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
Get full text
-
51
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…<p dir="ltr">In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
-
52
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
53
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007Get full text
Get full text
conferenceObject -
54
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Due to the difficulty of manually detecting and categorizing vast volumes of electronic text data, conventional methods for recognizing and combating cyberbullying have not proven successful. …”
Get full text
-
55
Computational Methods for Breast Cancer Molecular Profiling using Routine Histopathology: A Review
Published 2025“…<p dir="ltr">Precision medicine has become a central focus in breast cancer management, advancing beyond conventional methods to deliver more precise and individualized therapies. …”
-
56
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
57
-
58
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…Emotional intelligence is the automatic detection of human emotions using various intelligent methods. …”
Get full text
-
59
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…Various methods have been put forward to perform automatic social-based event detection and description. …”
Get full text
Get full text
Get full text
Get full text
article -
60
Deep and transfer learning for building occupancy detection: A review and comparative analysis
Published 2022“…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …”