Search alternatives:
processing algorithm » processing algorithms (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
develop » developed (Expand Search)
Showing 301 - 306 results of 306 for search '(((( develop rd algorithm ) OR ( settlement ipca algorithm ))) OR ( data processing algorithm ))', query time: 0.08s Refine Results
  1. 301

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …”
    Get full text
    article
  2. 302

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects by Mohamed Massaoudi (16888710)

    Published 2021
    “…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …”
  3. 303

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
    Get full text
    Get full text
    masterThesis
  4. 304

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  5. 305
  6. 306