-
81
Using machine learning for disease detection. (c2013)
Published 2016“…Classification has three main components: the classification algorithm, the pre-classified data (training data) and the un-classified data (testing data). …”
Get full text
Get full text
masterThesis -
82
Plant disease detection using drones in precision agriculture
Published 2023“…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …”
-
83
-
84
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Overall, studies that used smaller data sets reported higher accuracy.</p><h3>Conclusions</h3><p dir="ltr">This paper examined multiple AI-based skin cancer detection models. …”
-
85
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
86
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
Get full text
article -
87
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …”
-
88
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
-
89
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
-
90
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
Get full text
-
91
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The performance of three machine learning (ML) algorithms was assessed to predict the wild blueberry harvest losses on the ground. …”
-
92
VEGAWES: variational segmentation on whole exome sequencing for copy number detection
Published 2015“…We tested this algorithm on synthetic data and 100 Glioblastoma Multiforme primary tumor samples. …”
-
93
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
94
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
Get full text
-
95
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
96
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007Get full text
Get full text
conferenceObject -
97
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
98
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…This study's dataset was sourced from the Kaggle machine learning repository, and it refers to data gathering from wearable IoT devices. The experimental outcomes demonstrate the proposed MCFS, NCA, and NSCP algorithms work more effectively than previous feature selection, clustering and classification algorithms, respectively, in terms of accuracy, sensitivity, specificity, precision, recall, f-measure and execution time. …”
Get full text
-
99
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…”
Get full text
Get full text
Get full text
Get full text
article -
100
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
Get full text