-
801
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…There was also the dysregulation of 153 plasma proteins in individuals with dementia compared with those with MCI, and machine learning algorithms identified 8 biomarkers that classified dementia from MCI with an AUC of 0.87 ± 0.07. …”
-
802
Artificial intelligence-based methods for fusion of electronic health records and imaging data
Published 2022“…We present a comprehensive analysis of the various fusion strategies, the diseases and clinical outcomes for which multimodal fusion was used, the ML algorithms used to perform multimodal fusion for each clinical application, and the available multimodal medical datasets. …”
-
803
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We employed an ML method based on Random Forest (RF), Logistic Regression (LR), k-Nearest Neighbors (kNN), and Naive Bayes (NB) with a One-versus-Rest (OvR) strategy and then compared our work to other related works. Based on the performance metrics, such as confusion matrix, training time, prediction time, accuracy, and Area Under the Receiver Operating Characteristic curve (AUC-ROC), it was established that SDN-ML-IoT, when applied to RF, outperforms other ML algorithms, as well as similar approaches related to our work. …”
-
804
Data-Driven Electricity Demand Modeling for Electric Vehicles Using Machine Learning
Published 2024Get full text
doctoralThesis -
805
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
Published 2022“…The two movies are Wahed Tani which translates to (someone else) and Amahom which translate to (their uncle), Three datasets were employed, and several categorization models were compared across them. Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …”
Get full text
-
806
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”
-
807
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…In addition, both standard and extended performance evaluation metrics were employed to ensure a thorough assessment. …”
-
808
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
Published 2023“…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …”
-
809
Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants
Published 2022“…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”
-
810
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…Three machine learning algorithms support vector machine (SVM), AdaBoost, and Random forest are employed to assess the performance of the CNN features and fused CNN features. …”
-
811
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. As a result, IoMT has become a lucrative practice ground for cybercriminals. …”
-
812
Artificial Intelligence for Assessing the Correlation Between Sleep Apnoea and Comorbidities
Published 2022Get full text
doctoralThesis -
813
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
814
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
Published 2023“…Once the dataset was constructed and validated, I then conducted a performance evaluation and comparison of various basic Machine Learning algorithms, Deep Learning models, and stacking deep learning models on different datasets of Sentiment Analysis of Arabic Dialects. …”
Get full text
-
815
Deep Reinforcement Learning for Internet of Drones Networks: Issues and Research Directions
Published 2023“…Then, we briefly discuss some DRL algorithms used to address the issues and challenges of IoD networks. …”
-
816
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
Get full text
-
817
-
818
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
819
Extracranial traumatic carotid artery dissections in children
Published 2008“…Methods A systematic review of the literature was performed to examine the pertinent studies of traumatic extracranial carotid artery (CA) injuries in children. …”
Get full text
Get full text
Get full text
article -
820
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
Get full text
Get full text
Get full text
article