Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 661 - 680 results of 758 for search '(((( data using algorithm ) OR ( image processing algorithm ))) OR ( elements method algorithm ))*', query time: 0.13s Refine Results
  1. 661
  2. 662

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …”
  3. 663

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  4. 664

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  5. 665

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 666

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”
  7. 667

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
    Get full text
    Get full text
    Get full text
    article
  8. 668

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
  9. 669

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System by Mohd Imran (12249782)

    Published 2025
    “…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
  10. 670

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis by Nisreen Said Amer (17984077)

    Published 2024
    “…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
  11. 671
  12. 672

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  13. 673
  14. 674

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose by Atiq Ur Rehman (8843024)

    Published 2020
    “…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …”
  15. 675

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  16. 676

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …”
  17. 677
  18. 678

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 679

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
  20. 680