Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Raneem Qaddoura"'
Publikováno v:
Applied Sciences, Vol 14, Iss 12, p 5207 (2024)
High-dimensional datasets often harbor redundant, irrelevant, and noisy features that detrimentally impact classification algorithm performance. Feature selection (FS) aims to mitigate this issue by identifying and retaining only the most pertinent f
Externí odkaz:
https://doaj.org/article/6fc30ce2f9f94caa8766ff04c8fe0533
Autor:
Ruba Obiedat, Raneem Qaddoura, Ala' M. Al-Zoubi, Laila Al-Qaisi, Osama Harfoushi, Mo'ath Alrefai, Hossam Faris
Publikováno v:
IEEE Access, Vol 10, Pp 22260-22273 (2022)
Online media has an increasing presence on the restaurants’ activities through social media websites, coinciding with an increase in customers’ reviews of these restaurants. These reviews become the main source of information for both customers a
Externí odkaz:
https://doaj.org/article/9a950396ecd44cbbbe5ae6c6b76cefed
Autor:
Iman Almomani, Raneem Qaddoura, Maria Habib, Samah Alsoghyer, Alaa Al Khayer, Ibrahim Aljarah, Hossam Faris
Publikováno v:
IEEE Access, Vol 9, Pp 57674-57691 (2021)
In recent years, Ransomware has been a critical threat that attacks smartphones. Ransomware is a kind of malware that blocks the mobile’s system and prevents the user of the infected device from accessing their data until a ransom is paid. Worldwid
Externí odkaz:
https://doaj.org/article/07b015e0ed5f43d4887935d542240bd3
Publikováno v:
IEEE Access, Vol 9, Pp 85690-85708 (2021)
We are currently witnessing an immense proliferation of natural language processing (NLP) applications. Natural language generation (NLG) has emerged from NLP and is now commonly utilized in various applications, including chatting applications. The
Externí odkaz:
https://doaj.org/article/316485f92b704dffa83996b3d801569b
Publikováno v:
World Electric Vehicle Journal, Vol 14, Iss 2, p 41 (2023)
An intelligent, accurate, and powerful object detection system is required for automated driving systems to keep these vehicles aware of their surrounding objects. Thus, vehicles adapt their speed and operations to avoid crashing with the existing ob
Externí odkaz:
https://doaj.org/article/43199ed8dd2041eaba7ddd84a306ed79
Publikováno v:
Symmetry, Vol 13, Iss 12, p 2287 (2021)
Due to the accelerated growth of symmetrical sentiment data across different platforms, experimenting with different sentiment analysis (SA) techniques allows for better decision-making and strategic planning for different sectors. Specifically, the
Externí odkaz:
https://doaj.org/article/38197b886cd34dc3a59abbde1eb4e482
Publikováno v:
Applied Sciences, Vol 11, Iss 19, p 9080 (2021)
The world has witnessed recently a global outbreak of coronavirus disease (COVID-19). This pandemic has affected many countries and has resulted in worldwide health concerns, thus governments are attempting to reduce its spread and impact on differen
Externí odkaz:
https://doaj.org/article/6cfb66a13430431bbb1b03659100780a
Publikováno v:
Sensors, Vol 21, Iss 9, p 3279 (2021)
Maintaining a high quality of conversation between doctors and patients is essential in telehealth services, where efficient and competent communication is important to promote patient health. Assessing the quality of medical conversations is often h
Externí odkaz:
https://doaj.org/article/f3c437569d97465483bc2bfd0b138eb0
A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning
Publikováno v:
Sensors, Vol 21, Iss 9, p 2987 (2021)
The security of IoT networks is an important concern to researchers and business owners, which is taken into careful consideration due to its direct impact on the availability of the services offered by IoT devices and the privacy of the users connec
Externí odkaz:
https://doaj.org/article/9b3507883065475c8b880648899fac23
Publikováno v:
Applied Sciences, Vol 11, Iss 7, p 3022 (2021)
Intrusion detection of IoT-based data is a hot topic and has received a lot of interests from researchers and practitioners since the security of IoT networks is crucial. Both supervised and unsupervised learning methods are used for intrusion detect
Externí odkaz:
https://doaj.org/article/762f5299aa264748abe0434469656234