بدائل البحث:
mean algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
mean algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
-
141
Design and analysis of entropy-constrained reflected residual vector quantization
منشور في 2002"…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
احصل على النص الكامل
احصل على النص الكامل
article -
142
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
143
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
-
144
-
145
LDSVM: Leukemia Cancer Classification Using Machine Learning
منشور في 2022"…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
-
146
Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection
منشور في 2024"…In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
147
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
148
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
منشور في 2020"…The research work proposes a novel detection mechanism for ransomware using machine learning approach using Digital DNA sequencing. …"
احصل على النص الكامل
-
149
Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models
منشور في 2024"…These findings establish the robustness and effectiveness of hybrid architectures in enhancing emotion recognition accuracy in Arabic speech data, presenting a novel approach for Arabic dialect sentiment analysis.…"
احصل على النص الكامل
-
150
Generic DFT approach for pattern sensitive faults in word-orientedmemories
منشور في 1996"…The testability problem of word-oriented memories (WOMs) for pattern sensitive faults is addressed. A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. …"
احصل على النص الكامل
احصل على النص الكامل
article -
151
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
152
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
منشور في 2025"…This study not only examines the well-known challenges such as limited availability of data but provides a novel, structured taxonomy of deep learning techniques tailored for the monitoring of seagrass, highlighting their unique advantages and limitations within diverse marine environments. …"
-
153
Copy number variations in the genome of the Qatari population
منشور في 2015"…Genotyping intensities and genome sequencing data from 97 Qataris were analyzed with four different algorithms and integrated to discover 16,660 high confidence CNV regions (CNVRs) in the total population, affecting ~28 Mb in the median Qatari genome. …"
-
154
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …"
احصل على النص الكامل
-
155
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
156
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
منشور في 2024"…We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …"
-
157
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
-
158
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
منشور في 2024"…The DT technology enabled the creation of accurate virtual representations of users' physical environment, facilitating the optimization of energy-intensive devices and systems. Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
-
159
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
160
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article