-
161
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
Get full text
-
162
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
163
-
164
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
Get full text
-
165
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
166
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…In this work, a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification is proposed. …”
Get full text
article -
167
Using Machine Learning Algorithms to Forecast Solar Energy Power Output
Published 2025“…The data forecasting horizon used was a 24-h window in steps of 30 min. We focused on the first 30-min, 3-h, 6-h, 12-h, and 24-h windows to gain an appreciation of the impact of forecasting duration on the accuracy of prediction using the selected machine learning algorithms. …”
-
168
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
Published 2018“…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. Finally, we introduce a new model that allows the maximization of influence propagation while selecting a much smaller set of influencers. …”
Get full text
Get full text
Get full text
masterThesis -
169
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
-
170
Assessment and Performance Analysis of Machine Learning Techniques for Gas Sensing E-nose Systems
Published 2021Get full text
doctoralThesis -
171
VEGAWES: variational segmentation on whole exome sequencing for copy number detection
Published 2015“…VEGAWES is an extension to a variational based segmentation algorithm, VEGA: Variational estimator for genomic aberrations, which has previously outperformed several algorithms on segmenting array comparative genomic hybridization data. …”
-
172
Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks
Published 2025“…<h3>Purpose</h3><p dir="ltr">To evaluate image quality (IQ) of for‐processing (raw) and for‐presentation (clinical) radiography images, under different exposure conditions and digital image post‐processing algorithms, using a phantom that enables multiple detection tasks.…”
-
173
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…This paper addresses this problem through introducing a novel set and semantics based scheme that provides accurate and efficient analysis of XACML policies. …”
Get full text
Get full text
Get full text
article -
174
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
175
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
176
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
Get full text
-
177
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
178
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007Get full text
Get full text
conferenceObject -
179
A low degree vertex elimination with high degree vertex selection heuristic for strongly connected dominating and absorbent sets in wireless Ad-Hoc networks. (c2011)
Published 2016“…This thesis studies the Minimum SCDAS problem, which seeks a smallest SCDAS in a given digraph. We introduce a new heuristic approach based on a hybrid of low-degree vertex elimination and high-degree vertex selection. …”
Get full text
Get full text
masterThesis -
180
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …”