Showing 321 - 340 results of 690 for search '(((( data using algorithm ) OR ( data code algorithm ))) OR ( element would algorithm ))', query time: 0.12s Refine Results
  1. 321

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
    Get full text
    Get full text
    masterThesis
  2. 322

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  3. 323
  4. 324
  5. 325

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
  6. 326
  7. 327
  8. 328
  9. 329

    Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter by Yahia, Mohamed

    Published 2020
    “…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…”
    Get full text
    article
  10. 330

    FPGA-Based Network Traffic Classification Using Machine Learning by Elnawawy, Mohammed

    Published 2020
    “…The proposed design achieves an average throughput of 163.24 Gbps, exceeding throughputs of reported hardware-based classifiers that use comparable approaches, which in turn ensures the continuity of realtime traffic classification at congested data centers.…”
    Get full text
    article
  11. 331

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
  12. 332
  13. 333

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
  14. 334

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  15. 335

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents by Muhammad E. H. Chowdhury (14150526)

    Published 2019
    “…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
  16. 336

    Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves by S. Andhale, Yogesh

    Published 2018
    “…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …”
    Get full text
  17. 337

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Multiple models have been proposed and different techniques and data structures were used. Our approach provides a damage assessment and recovery algorithm that is based on agents and graphs.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 338
  19. 339

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…The sensors are unbiased radars with fixed locations. The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
    Get full text
  20. 340

    Modelling Exchange Rates during Currency Crisis using Neural Networks by Nasr, G. E.

    Published 2006
    “…Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
    Get full text
    Get full text
    Get full text
    conferenceObject