Showing 321 - 340 results of 387 for search 'differences based algorithm', query time: 0.06s Refine Results
  1. 321
  2. 322

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  3. 323

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…</p><h3>Objective</h3><p dir="ltr">The aim of this study was to identify and group the different types of AI-based technologies used to detect and classify skin cancer. …”
  4. 324
  5. 325

    The automation of the development of classification models and improvement of model quality using feature engineering techniques by Sjoerd Boeschoten (17347045)

    Published 2023
    “…In this article, we propose a framework that combines feature engineering techniques such as data imputation, transformation, and class balancing to compare the performance of different prediction models and select the best final model based on predefined parameters. …”
  6. 326

    Identification of phantom movements with an ensemble learning approach by Akhan Akbulut (17380285)

    Published 2022
    “…In the current study, we utilized ensemble learning algorithms for the recognition and classification of phantom movements of the different amputation levels of the upper and lower extremity. …”
  7. 327

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  8. 328

    Systematic reviews in sentiment analysis: a tertiary study by Alexander Ligthart (14150871)

    Published 2022
    “…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
  9. 329

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…The most commonly used data belonged to the clinical category (19, 58%). We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
  10. 330

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …”
    Get full text
    Get full text
    masterThesis
  11. 331

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…There have been great improvements in web technology over the past years which heavily loaded the Internet with various digital contents of different fields. This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
    Get full text
  12. 332

    Diabetic Sensorimotor Polyneuropathy Severity Classification Using Adaptive Neuro Fuzzy Inference System by Fahmida Haque (16896489)

    Published 2021
    “…The model accuracy was validated with the results from different machine learning algorithms. The Accuracy, sensitivity, and specificity of the ANFIS model are 91.17±1.18%, 92±2.26%, 96.72±0.93%, respectively. …”
  13. 333

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity by Sweidan, Zahraa

    Published 2020
    “…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 334

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  15. 335
  16. 336

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …”
    Get full text
    Get full text
    Get full text
    article
  17. 337
  18. 338

    Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta by Vaisali Chandrasekar (16904526)

    Published 2023
    “…In this regard, our study aims to predict the permeability of molecules across the placental barrier. Based on publicly available datasets, several machine learning models are comprehensively analysed across different fingerprints and toolkits to find the best suitable models. …”
  19. 339
  20. 340

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”