[PDF][PDF] A survey on machine learning: concept, algorithms and applications

K Das, RN Behera - International Journal of Innovative Research in …, 2017 - smec.ac.in
Over the past few decades, Machine Learning (ML) has evolved from the endeavour of few
computer enthusiasts exploiting the possibility of computers learning to play games, and a …

State-of-the-art and future research challenges in uav swarms

S Javed, A Hassan, R Ahmad, W Ahmed… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Due to their potential to accomplish complicated missions more effectively, UAV swarms
have attracted a lot of attention lately. UAV swarm offers enhanced intelligence, improved …

[PDF][PDF] Optimize machine learning programming algorithms for sentiment analysis in social media

MS Alharbi, ESM El-Kenawy - International Journal of Computer …, 2021 - researchgate.net
Sentiment analysis (SA) is used to evaluate the polarity of reviews. In SA, the feature
selection phase is essential, as the best way to solve all optimization problems not happen …

[PDF][PDF] A new model for measuring customer utility trust in online auctions

ESM El-Kenawy, M Eid, AH Ismail - International Journal of …, 2020 - researchgate.net
Reports from the US Federal Bureau of investigation have indicated a lot of unethical
activities taking place on the internet environments. Despite some technical challenges …

AD-Hoc Routing Protocols in WSN-WiFi based IoT in Smart Home

SW Nourildean, MD Hassib… - … on Developments in …, 2023 - ieeexplore.ieee.org
Future Internet, described as an “Internet of Things,” is planned to be a global network of
connected items, each with a unique address, based on industry-standard protocol. It is an …

[PDF][PDF] New Decision-Making Technique Based on Hurwicz Criteria for Fuzzy Ranking.

D Sukheja, JA Shah, G Madhu, KS Kautish… - … , Materials & Continua, 2022 - academia.edu
Efficient decision-making remains an open challenge in the research community, and many
researchers are working to improve accuracy through the use of various computational …

[PDF][PDF] An efficient hybrid approach for Twitter sentiment analysis based on bidirectional recurrent neural networks

K Shazly, M Eid, H Salem - International Journal of Computer …, 2020 - researchgate.net
Many optimization problems from various applications have been solved by many
algorithms such as Grey Wolf Optimizer (GWO), Genetic Algorithm (GA), Whale Optimization …

[HTML][HTML] Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks

M Benguenane, A Korichi, B Brik, N Azzaoui - Applied Sciences, 2023 - mdpi.com
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due
to the distinct characteristics of such networks, such as their highly dynamic topology and …

Enhancing wireless subscriber performance through AODV routing protocol in simulated mobile Ad-hoc networks

N Basil, SH Ahammad, EE Elsayed - Engineering Applications, 2024 - publish.mersin.edu.tr
The investigation of impromptu network routing algorithms has been a focal point in
exploration of networks associated with Ad-Hoc systems. This study uses the OPNET …

[PDF][PDF] A new hybrid video encryption technique based on chaos cryptography

MM Eid, ESM El-kenawy, A Ibrahim - J. Comput. Sci. Inf. Syst, 2021 - researchgate.net
The widespread IoT and the Electronic world and the use of multimedia videos and images
over the Internet have caused an increase in the need to protect these multimedia data …