-
301
-
302
-
303
Digital Marketing’s Effect on Middle East and North Africa (MENA) Banks’ Success: Unleashing the Economic Potential of the Internet
Published 2024“…The research examines the impact of digital marketing techniques on the effectiveness of financial institutions through Tobit regression analysis, taking into account and controlling for sustainable practices (ESG), bank-specific characteristics (capital adequacy, bank size, liquidity, and cost efficiency), and macroeconomic variables (GDP and inflation). …”
-
304
-
305
-
306
-
307
-
308
Re-examining post-acceptance model of information systems continuance: A revised theoretical model using MASEM approach
Published 2023“…The results confirm the significance of all the relationships proposed in the original model. …”
-
309
-
310
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…The main idea behind using a hybrid feature selection step is to select a small subset from original data that can achieve maximum classification accuracy and reduce the computational complexity of the RF technique. Then, the sensitive and significant characteristics are transmitted to the RF model for classification purposes. …”
-
311
-
312
-
313
-
314
A machine learning model for early detection of diabetic foot using thermogram images
Published 2021“…<p dir="ltr">Diabetes foot ulceration (DFU) and amputation are a cause of significant morbidity. The prevention of DFU may be achieved by the identification of patients at risk of DFU and the institution of preventative measures through education and offloading. …”
-
315
-
316
-
317
-
318
-
319
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
320