[PDF][PDF] Recent Advances in Practical Data Reduction.

FN Abu-Khzam, S Lamm, M Mnich, A Noe… - Algorithms for Big …, 2022 - library.oapen.org
Over the last two decades, significant advances have been made in the design and analysis
of fixed-parameter algorithms for a wide variety of graphtheoretic problems. This has …

Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks

S Gayathri, D Surendran - Journal of Cloud Computing, 2024 - Springer
Abstract Anomaly detection in Wireless Sensor Networks (WSNs) is critical for their reliable
and secure operation. Optimizing resource efficiency is crucial for reducing energy …

Vulnerability rating of source code with token embedding and combinatorial algorithms

JR Barr, P Shaw, FN Abu-Khzam… - International Journal of …, 2020 - World Scientific
We present an empirical analysis of the source code of the Fluoride Bluetooth module,
which is a part of standard Android OS distribution, by exhibiting a novel approach for …

Sentiment analysis of semantically interoperable social media platforms using computational intelligence techniques

A Alqahtani, SB Khan, J Alqahtani, S AlYami… - Applied Sciences, 2023 - mdpi.com
Competitive intelligence in social media analytics has significantly influenced behavioral
finance worldwide in recent years; it is continuously emerging with a high growth rate of …

Recent advances in practical data reduction

F Abu-Khzam, S Lamm, M Mnich, A Noe… - arxiv preprint arxiv …, 2020 - arxiv.org
Over the last two decades, significant advances have been made in the design and analysis
of fixed-parameter algorithms for a wide variety of graph-theoretic problems. This has …

A deep learning approach for sentiment and emotional analysis of Lebanese Arabizi twitter data

M Raïdy, H Harmanani - International Conference on Information …, 2023 - Springer
Arabizi is an Arabic dialect that is represented in Latin transliteration and is commonly used
in social media and other informal settings. This work addresses the problem of Arabizi text …

Combinatorial code classification & vulnerability rating

JR Barr, P Shaw, FN Abu-Khzam, S Yu… - 2020 second …, 2020 - ieeexplore.ieee.org
Empirical analysis of source code of Android Fluoride Bluetooth stack demonstrates a novel
approach of classification of source code and rating for vulnerability. A workflow that …

[HTML][HTML] (1, 1)-Cluster Editing is polynomial-time solvable

G Gutin, A Yeo - Discrete Applied Mathematics, 2023 - Elsevier
A graph H is a clique graph if H is a vertex-disjoin union of cliques. Abu-Khzam (2017)
introduced the (a, d)-Cluster Editing problem, where for fixed natural numbers a, d, given a …

On the Complexity of 2-club Cluster Editing with Vertex Splitting

FN Abu-Khzam, T Davot, L Isenmann… - arxiv preprint arxiv …, 2024 - arxiv.org
Editing a graph to obtain a disjoint union of s-clubs is one of the models for correlation
clustering, which seeks a partition of the vertex set of a graph so that elements of each …

Anomaly detection via correlation clustering

P Shaw, JR Barr, FN Abu-Khzam - 2022 IEEE 16th …, 2022 - ieeexplore.ieee.org
Anomaly detection has been studied and modeled using various methods, mostly statistical
but also combinatorial, including clustering. This paper investigates the utility of using exact …