-
321
-
322
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
323
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…</p><h3>Objective</h3><p dir="ltr">The aim of this study was to identify and group the different types of AI-based technologies used to detect and classify skin cancer. …”
-
324
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
325
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…In this article, we propose a framework that combines feature engineering techniques such as data imputation, transformation, and class balancing to compare the performance of different prediction models and select the best final model based on predefined parameters. …”
-
326
Identification of phantom movements with an ensemble learning approach
Published 2022“…In the current study, we utilized ensemble learning algorithms for the recognition and classification of phantom movements of the different amputation levels of the upper and lower extremity. …”
-
327
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
328
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
-
329
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
Published 2021“…The most commonly used data belonged to the clinical category (19, 58%). We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
-
330
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …”
Get full text
Get full text
masterThesis -
331
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…There have been great improvements in web technology over the past years which heavily loaded the Internet with various digital contents of different fields. This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
Get full text
-
332
Diabetic Sensorimotor Polyneuropathy Severity Classification Using Adaptive Neuro Fuzzy Inference System
Published 2021“…The model accuracy was validated with the results from different machine learning algorithms. The Accuracy, sensitivity, and specificity of the ANFIS model are 91.17±1.18%, 92±2.26%, 96.72±0.93%, respectively. …”
-
333
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
Get full text
Get full text
Get full text
masterThesis -
334
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
335
-
336
Common weaving approach in mainstream languages for software security hardening
Published 2013“…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …”
Get full text
Get full text
Get full text
article -
337
-
338
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
Published 2023“…In this regard, our study aims to predict the permeability of molecules across the placental barrier. Based on publicly available datasets, several machine learning models are comprehensively analysed across different fingerprints and toolkits to find the best suitable models. …”
-
339
-
340
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”