-
1
Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis
Published 2021“…This work leverages the output of wearable technology to provide automatic stress and stressor identification model. …”
-
2
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
3
-
4
Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks
Published 2025“…<h3>Purpose</h3><p dir="ltr">To evaluate image quality (IQ) of for‐processing (raw) and for‐presentation (clinical) radiography images, under different exposure conditions and digital image post‐processing algorithms, using a phantom that enables multiple detection tasks.…”
-
5
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
6
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …”
-
7
-
8
-
9
Automatic image quality evaluation in digital radiography using for‐processing and for‐presentation images
Published 2024“…<h3>Purpose</h3><p dir="ltr">To investigate the impact of digital image post‐processing algorithms on various image quality (IQ) metrics of radiographic images under different exposure conditions.…”
-
10
-
11
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
12
Creating and detecting fake reviews of online products
Published 2022“…However, the usefulness of online reviews is impeded by fake reviews that give an untruthful picture of product quality. Therefore, detection of fake reviews is needed. Unfortunately, so far, automatic detection has only had partial success in this challenging task. …”
-
13
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…We present a method to convert the original problem into a discrete combinatorial optimization problem and solve it by a genetic algorithm. We also incorporate a corner detection algorithm to detect significant points which are necessary to capture a pleasant looking spline fitting for shapes such as fonts. …”
Get full text
Get full text
article -
14
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
15
RFID localization using single reader antenna. (c2014)
Published 2016“…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
Get full text
Get full text
masterThesis -
16
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…The proposed hybrid model improves the accuracy of all the studied datasets and can be integrated into different social media sites to automatically detect cyberbullying from Arabic social datasets. …”
Get full text
-
17
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…The proposed hybrid model improves the accuracy of all the studied datasets and can be integrated into different social media sites to automatically detect cyberbullying from Arabic social datasets. …”
Get full text
Get full text
-
18
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
19
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
20
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…Various methods have been put forward to perform automatic social-based event detection and description. …”
Get full text
Get full text
Get full text
Get full text
article