Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
341
-
342
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
-
343
-
344
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …”
-
345
-
346
-
347
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
348
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
349
Soft Sensor for NOx Emission using Dynamical Neural Network
Published 2020“…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …”
Get full text
article -
350
-
351
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …”
Get full text
article -
352
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Techniques for natural language processing may be used to text data to extract useful features like sentiment, emotion, and subjectivity. …”
Get full text
-
353
RFID localization using single reader antenna. (c2014)
Published 2016“…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
Get full text
Get full text
masterThesis -
354
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
355
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
356
-
357
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
-
358
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
359
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…”
Get full text
article -
360
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The proposed design achieves an average throughput of 163.24 Gbps, exceeding throughputs of reported hardware-based classifiers that use comparable approaches, which in turn ensures the continuity of realtime traffic classification at congested data centers.…”
Get full text
article