-
61
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…Results show that, in most cases, our proposed technique out-performs the others in different aspects.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
62
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
منشور في 2020احصل على النص الكامل
doctoralThesis -
63
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
64
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
منشور في 2021"…Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …"
-
65
Low Cost Autopilot Design Using Fuzzy Supervisory Control
منشور في 2005احصل على النص الكامل
doctoralThesis -
66
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
67
Random vector functional link network: Recent developments, applications, and future directions
منشور في 2023"…Moreover, we discuss the different hyperparameter optimization techniques followed in the literature to improve the generalization performance of the RVFL model. …"
-
68
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
69
Resilience analytics: coverage and robustness in multi-modal transportation networks
منشور في 2018"…<p>A multi-modal transportation system of a city can be modeled as a multiplex network with different layers corresponding to different transportation modes. …"
-
70
DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs
منشور في 2025"…As such, in addition to avoiding coverage holes, we should also make the outage time as small as possible. By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …"
-
71
Metallic coating thickness assessment over nonmagnetic metals using eddy current technology
منشور في 2019احصل على النص الكامل
doctoralThesis -
72
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…The scammers are making money through fraudulent job postings. Online recruitment fraud has emerged as an important issue in cybercrime. …"
-
73
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
74
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Steganography is the process of obfuscation that makes something incomprehensible and unclear. Different image steganography research methods are proposed recently but each has their advantages and disadvantages and still have necessity to develop some better image steganography mechanisms to achieve the reliability between the basics criteria of image steganography. …"
-
75
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
منشور في 2024"…The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
-
76
CEAP
منشور في 2016"…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
77
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
منشور في 2024"…However, the ECG can be interpreted differently by humans depending on the interpreter's level of training and experience, which could make diagnosis more difficult. …"
-
78
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
منشور في 2024"…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. This app uses key stroke-related timelines including the last time the patient was known to be well, patient location, treatment options, and imaging availability at different health care facilities.…"
-
79
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
80
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis