Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
181
-
182
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …”
-
183
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. …”
Get full text
article -
184
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…Recent studies have successfully identified the fundamental causes underlying the existence of BP in QNNs. …”
-
185
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
186
-
187
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …”
-
188
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
-
189
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
190
Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review
Published 2021“…In addition, this review analyzes recent automatic architecture optimization algorithms for DL-based PVPF. …”
-
191
3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019)
Published 2019“…Unmanned aerial vehicles (UAVs) have recently emerged as enablers for mul- titude use cases in 5G networks leading to interesting industrial and business applications. 5G networks envision a multi-service network promoting various applications with a distinct set of performance and service demands. …”
Get full text
Get full text
Get full text
masterThesis -
192
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. In the current study, we utilize RNA sequencing data to identify lncRNA-based biomarkers associated with TNBC, ER+ subtypes, and normal breast tissue. …”
-
193
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
194
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …”
-
195
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
196
Various Faults Classification of Industrial Application of Induction Motors Using Supervised Machine Learning: A Comprehensive Review
Published 2025“…This paper presents a comprehensive review of recent techniques proposed in the literature for bearing, stator winding and broken rotor bar faults with machine learning algorithms focused on fault detection for numerous faults. …”
-
197
Precision nutrition: A systematic literature review
Published 2021“…Machine learning, a subbranch of Artificial Intelligence, has promise to aid in the development of predictive models that are suitable for Precision Nutrition. As such, recent research has applied machine learning algorithms, tools, and techniques in precision nutrition for different purposes. …”
-
198
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
199
Automated liver tissues delineation techniques: A systematic survey on machine learning current trends and future orientations
Published 2023“…Hence, in this paper, we survey the key studies that are published between 2014 and 2022, showcasing the different machine learning algorithms researchers have used to segment the liver, hepatic tumors, and hepatic-vasculature structures. …”
-
200
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…<div><p>Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolution is hampered by cybersecurity threats like spoofing, denial of service (DoS), distributed denial of service (DDoS) attacks, intrusions, malwares, authentication problems or other fatal attacks. …”