Showing 61 - 80 results of 196 for search '(( elements means algorithm ) OR ((( data code algorithm ) OR ( data making algorithm ))))', query time: 0.14s Refine Results
  1. 61

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  2. 62

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization by Chintalapani, Gouthami

    Published 2016
    “…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 63

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights by Malekloo, Arman

    Published 2021
    “…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …”
    Get full text
    article
  4. 64

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  5. 65
  6. 66

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
  7. 67
  8. 68

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …”
  9. 69

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …”
  10. 70

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …”
    Get full text
    Get full text
    masterThesis
  11. 71

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…”
  12. 72
  13. 73

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  14. 74

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 75

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data has not been investigated to the extent that such analysis can support decision-making or revenue/budget forecasting. …”
    Get full text
  16. 76

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…Our experimental results on four benchmark datasets conclusively demonstrate that the proposed algorithm makes accurate recommendations in item cold-start settings compared to the state-of-the-art algorithms according to commonly used ranking metrics like Normalized Discounted Cumulative Gain (NDCG) and Mean Average Precision (MAP). …”
  17. 77
  18. 78
  19. 79

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  20. 80

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. Various search engines, like Google Scholar, Semantic Scholar, Web of Science etc. …”