-
141
Four-dimensional representation and collision detection forpolytopic objects
Published 1998“…An algorithm for detecting the collision of moving objects is presented. …”
Get full text
Get full text
article -
142
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce VHDRA, a Vertical and Horizontal Data Reduction Approach, to improve the classification accuracy and speed of the NNGE algorithm and reduce the computational resource consumption. …”
-
143
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Traditional skin cancer diagnosis methods are costly, require a professional physician, and take time. Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
144
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…The proposed scheme for handover prediction outperforms traditional methods i.e. received signal strength method and traveling distance method by reducing the number of unnecessary handovers by 60% and 50% respectively. Similarly, in AP selection, the proposed scheme outperforms the strongest signal first and least loaded first algorithms by achieving higher throughput gains up to 9.2% and 8% respectively.…”
-
145
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
146
Computer-aided detection of Melanoma using geometric features
Published 2017“…In this work, we investigate the use of geometric features to differentiate between a benign lesion and a malignant one. The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
147
-
148
Malicious URL and Intrusion Detection using Machine Learning
Published 2024“…Therefore, addressing the growing threat of cyberattacks and providing automated solutions became a necessity. The purpose of this paper is to use machine learning (ML) techniques for malicious websites detection and classification, and intrusion detection. …”
Get full text
article -
149
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Consequently, I have designed and built a new Arabic text repository, the largest available, that can serve me and others in investigating various classifiers to deal with the issue of detecting cyberbullying. …”
Get full text
-
150
-
151
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
152
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020“…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. …”
Get full text
article -
153
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
154
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
155
Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs
Published 2008“…Purpose – This paper seeks to identify and propose a standard approach for the selection and optimization of fuzzy sets used in fuzzy decision‐making systems. …”
Get full text
Get full text
Get full text
Get full text
article -
156
Detection of statistically significant network changes in complex biological networks
Published 2017“…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
157
Combining and adapting software quality predictive models by genetic algorithms
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
158
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019“…Since the adaptation of the most advanced security paradigm does not guarantee a full protection. Also, it is possible that the attack is not directly detected. …”
Get full text
Get full text
Get full text
masterThesis -
159
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
Published 2024“…This work aims to enhance the performance of the K-means algorithm by introducing a novel method for selecting the initial centroids, thereby minimizing randomness and reducing the number of iterations needed to reach optimal results. …”
Get full text
Get full text
Get full text
masterThesis -
160
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text