بدائل البحث:
learner algorithm » learning algorithms (توسيع البحث), search algorithm (توسيع البحث), deer algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
learner algorithm » learning algorithms (توسيع البحث), search algorithm (توسيع البحث), deer algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
-
2
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
3
Identification of phantom movements with an ensemble learning approach
منشور في 2022"…Recognition of these movements is crucial for both technology-based amputee rehabilitation and prosthetic control. …"
-
4
-
5
-
6
-
7
-
8
Automatic Video Summarization Using HEVC and CNN Features
منشور في 2022احصل على النص الكامل
doctoralThesis -
9
-
10
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
11
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
12
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …"
-
13
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
14
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
منشور في 2024"…To address this complexity optimally, we propose a deep reinforcement learning (DRL) approach based on the deep deterministic policy gradient (DDPG) technique. The DDPG algorithm can adapt to channel variations due to user movement and high-dimensional factors. …"
-
15
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …"
-
16
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
منشور في 2025"…The dataset, consisting of over 1200 videos featuring both seen and unseen individuals, is also used to detect deepfake videos targeting vulnerable individuals. …"
احصل على النص الكامل
article -
17
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
18
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
منشور في 2009احصل على النص الكامل
doctoralThesis