Search alternatives:
model selection » wheel selection (Expand Search)
code encryption » secure encryption (Expand Search)
model selection » wheel selection (Expand Search)
code encryption » secure encryption (Expand Search)
-
141
Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice
Published 2020“…Our approach is a simple and efficient voice-based algorithm in which a multi-center and multi threshold based ternary pattern is used (MCMTTP). …”
-
142
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
-
143
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…Due to the complexity of Arabic poetry such as the excessive use of metaphors, figurative language, unlimited imagination, and the diversity of styles from one poet to another and from one poem to another, we tackle these challenges by careful employment of preprocessing steps, feature engineering and selection. We also explore a range of algorithms, including traditional classifiers and deep learning models, to determine and select the most suitable and accurate models of identifying poets' names from the verses. …”
Get full text
-
144
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
Published 2022“…The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
-
145
A Machine Learning Approach to Predicting Diabetes Complications
Published 2021Get full text
doctoralThesis -
146
-
147
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …”
-
148
Structural similarity evaluation between XML documents and DTDs
Published 2007“…Our approach is based on the concept of tree edit distance, as an effective and efficient means for comparing tree structures, XML documents and DTDs being modeled as ordered labeled trees. It is of polynomial complexity, in comparison with existing exponential algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
149
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML
Published 2022“…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …”
-
150
A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions
Published 2024“…The studied hybrid optimization MPPT methods are equated in terms of oscillations across MPP, output power extraction, settling time of the MPP, dependency on the PV modeling, operating duty value of the converter, error finding accuracy of MPPT, algorithm complexity, tracking speed, periodic tuning required, and the number of sensing parameters utilized. …”
-
151
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
Published 2024“…Furthermore, future studies could evaluate more efficient modeling algorithms, especially those combining topic modeling with statistical uncertainty quantification, such as conformal prediction.…”
-
152
A family of minimum curvature variable-methods for unconstrained optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis -
153
-
154
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
Get full text
-
155
Precision nutrition: A systematic literature review
Published 2021“…Models were through the use of four groups of approaches and 23 evaluation metrics. …”
-
156
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
Published 2024“…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
-
157
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
Get full text
article -
158
Approximate XML structure validation technical report
Published 2014“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
article -
159
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
Published 2023“…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
-
160
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”