-
341
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Published 2023“…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
Get full text
Get full text
Get full text
article -
342
Automated liver tissues delineation techniques: A systematic survey on machine learning current trends and future orientations
Published 2023“…Hence, in this paper, we survey the key studies that are published between 2014 and 2022, showcasing the different machine learning algorithms researchers have used to segment the liver, hepatic tumors, and hepatic-vasculature structures. …”
-
343
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
-
344
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
345
-
346
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
Get full text
article -
347
The role of Reinforcement Learning in software testing
Published 2023“…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…”
-
348
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
349
Common weaving approach in mainstream languages for software security hardening
Published 2013“…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …”
Get full text
Get full text
Get full text
article -
350
-
351
Comparative assessment of fracture risk among osteoporosis and osteopenia patients: a cross-sectional study
Published 2018“…The assessment of the fracture risk was executed by applying the Fracture Assessment Risk (FRAX) index (an algorithm developed by the World Health Organization) based on clinical fracture risks or combination of clinical fracture risks and bone mineral density.…”
-
352
-
353
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …”
Get full text
-
354
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
Published 2021“…The most commonly used data belonged to the clinical category (19, 58%). We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
-
355
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false-positive rate, and computational overhead with respect to the differing number of queries. The results revealed that the RFBXSQLQC technique outperforms the existing algorithms by 19% with pattern detection accuracy, 34% minimized time complexity, 64% false-positive rate, and 31% in terms of computational overhead.…”
-
356
Assessment and Performance Analysis of Machine Learning Techniques for Gas Sensing E-nose Systems
Published 2021Get full text
doctoralThesis -
357
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…We then provide a general keyword query model with specially tailored query processing algorithms built on top of SemIndex, in order to produce semantic-aware results, allowing the user to choose the results' semantic coverage and expressiveness based on her needs. …”
Get full text
Get full text
Get full text
Get full text
article -
358
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
359
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
-
360
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…The main purpose is to bridge the gap between EDM and International Assessments in the Arab world by applying EDM to predict Grade-4 student levels in TIMSS assessments in the UAE. We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text