Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
61
Segmenting Handwritten Arabic Text
Published 2002“…In this work a technique is presented that segments difficult handwritten Arabic text. A conventional algorithm is used for the initial segmentation of the text into connected blocks of characters. …”
Get full text
Get full text
Get full text
article -
62
Clustering/partitioning algorithms and comparative analysis
Published 1989Get full text
Get full text
masterThesis -
63
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
64
-
65
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …”
Get full text
Get full text
masterThesis -
66
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…New technologies, such as Next-Generation Genome Sequencing, can now provide huge amounts of data in little time. Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …”
Get full text
Get full text
masterThesis -
67
-
68
-
69
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…Some examples are given to show the results obtained from the algorithm…”
Get full text
Get full text
article -
70
-
71
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
Published 2022“…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
-
72
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
Get full text
article -
73
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
Get full text
article -
74
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
Indexing Arabic texts using association rule data mining
Published 2019“…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
Get full text
Get full text
Get full text
Get full text
article -
76
Using genetic algorithms to optimize software quality estimation models
Published 2004“…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …”
Get full text
Get full text
Get full text
masterThesis -
77
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
78
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
79
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019“…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
Get full text
article -
80