Search alternatives:
learning algorithm » learning algorithms (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
learning algorithm » learning algorithms (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
-
221
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…This work proposes various machine learning methods, including transfer learning via fine-tuning, transfer learning via feature extraction, ensembles of deep convolutional neural network (CNN) models, and fusion of CNN features, to develop a preliminary dysgraphia diagnosis system based on handwritten images. …”
-
222
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
223
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
-
224
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis -
225
A new fuzzy logic controller based IPM synchronous motor drive
Published 2003“…The proposed FLC is designed to have less computational burden, which makes it suitable for online implementation. The FLC parameters are optimized by genetic algorithm. …”
Get full text
Get full text
article -
226
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
227
-
228
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Moreover, we propose a set of effective algorithms to generate solutions for relatively large-scale network scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
229
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
230
-
231
A 3-D vision-based man-machine interface for hand-controlled telerobot
Published 2005“…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
Get full text
Get full text
article -
232
-
233
Boosting the visibility of services in microservice architecture
Published 2023“…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. …”
-
234
-
235
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The second scheme based on a modular learning stretegy consisting of three functional blocks, takes into account the nonstationary character of the ultrasonic NDE system and makes use of the " information preserving rule" which allows accurate and reliable classification procedure. …”
Get full text
masterThesis -
236
Oversampling techniques for imbalanced data in regression
Published 2024“…We adapt K-Nearest Neighbor Oversampling-Regression (KNNOR-Reg), originally for imbalanced classification, to address imbalanced regression in low population datasets, evolving to KNNOR-Deep Regression (KNNOR-DeepReg) for high-population datasets. …”
-
237
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
238
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
239
Correlation Clustering with Overlaps
Published 2020“…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
240
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Cyborg intelligence is one of the most popular and advanced technologies suitable for securing smart city networks against cyber threats. Various machine learning and deep learning-based cyborg intelligence mechanisms have been developed to protect smart city networks by ensuring property, security, and privacy. …”