Showing 61 - 80 results of 80 for search '(( implementing future algorithm ) OR ((( relevant data algorithm ) OR ( elements wt algorithm ))))', query time: 0.12s Refine Results
  1. 61

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  2. 62

    An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study by Sara Al-Haidous (18095368)

    Published 2022
    “…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …”
  3. 63

    Novel biomarkers for potential risk stratification of drug induced liver injury (DILI) by Mohammed Ibn-Mas’ud Danjuma (13192169)

    Published 2019
    “…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …”
  4. 64

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text
  5. 65

    Vehicular-OBUs-As-On-Demand-Fogs by Sami, Hani

    Published 2020
    “…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 66

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review by Ruba, Sulaiman

    Published 2025
    “…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
    Get full text
    Get full text
    Get full text
    article
  7. 67

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review by Ruba Sulaiman (17734065)

    Published 2025
    “…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
  8. 68

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…It is built upon the extant data obfuscation paradigm. The future work lies with the implementation and establishment of its viability. …”
    Get full text
    Get full text
  9. 69

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  10. 70

    Using C++ to Calculate SO(10) Tensor Couplings by Bhagwagar, Azadan

    Published 2021
    “…Therefore, there exists an opportunity to leverage the abilities of computer software in order to algorithmically perform these calculations on demand. …”
    Get full text
    article
  11. 71

    Distilling Wisdom: A Review on Optimizing Learning From Massive Language Models by Dingzong Zhang (23275066)

    Published 2025
    “…This survey provides a detailed discussion of the basic principles, algorithms, and implementation methods of knowledge distillation. …”
  12. 72

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning by Mohamed Massaoudi (16888710)

    Published 2025
    “…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”
  13. 73
  14. 74

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
  15. 75
  16. 76

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
  17. 77

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring by Aya Nabil Sayed (17317006)

    Published 2024
    “…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
  18. 78

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
    Get full text
  19. 79

    Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges by Muhammad Mohsin Khan (22303366)

    Published 2025
    “…Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …”
  20. 80

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study by Alaa Abd-alrazaq (17058018)

    Published 2024
    “…</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …”