-
61
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
62
The effects of data balancing approaches: A case study
Published 2023“…Our LC-HRMS dataset contains 1241 bovine urine samples, of which only 65 specimens were from animal studies and guaranteed to contain growth-stimulating hormones while the rest has been reported to be untreated, making it a ∼5% imbalanced dataset. In this research, classification algorithms, combined with resampling strategies and dimensionality reduction methods, were investigated to find a prediction model to correctly identify the samples of treated animals. …”
-
63
Android Malware Detection Using Machine Learning
Published 2024“…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …”
Get full text
article -
64
A machine learning model for early detection of diabetic foot using thermogram images
Published 2021“…A comparison of the inference time for the best-performing networks confirmed that the proposed algorithm can be deployed as a smartphone application to allow the user to monitor the progression of the DFU in a home setting.…”
-
65
-
66
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
Published 2020“…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …”
-
67
-
68
-
69
-
70
A comparative study of regression testing methods. (c1996)
Published 1996Get full text
Get full text
masterThesis -
71
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…The five selected tools that were evaluated for the real estate company are RapidMiner, Weka 3.6, NeuroXL, Knowledge Miner, and DMSK with RapidMiner leading the tools in advanatges for a small business in the real estate sector in the city of Dubai.…”
Get full text
-
72
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
-
73
Regression Testing of Database Applications
Published 2002Get full text
Get full text
Get full text
article -
74
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
Get full text
article -
75
Simulated evolution for timing and low power VLSI standard cell placement
Published 2020Get full text
article -
76
-
77
-
78
Mobile Energy Storage Systems for Benefit Maximization in Resilient Smart Grids
Published 2025Get full text
doctoralThesis -
79
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
80
Turbo-charging dominating set with an FPT subroutine
Published 2017Get full text
Get full text
Get full text
conferenceObject