Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
level using » level fusion (Expand Search)
element » elements (Expand Search)
Showing 261 - 280 results of 305 for search '(((( image processing algorithm ) OR ( element network algorithm ))) OR ( level using algorithm ))', query time: 0.12s Refine Results
  1. 261

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. With the advent of fog computing, personal mobile devices in a given geographical area may also comprise a very dynamic distributed storage system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 262

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 263

    Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review by Loay A. Salman (14150322)

    Published 2023
    “…</p><h3>Conclusion</h3><p dir="ltr">This study demonstrated the potential of AI as a valuable complement for planning TKA, exhibiting a satisfactory level of reliability in predicting TKA implant sizes. …”
  4. 264

    Software defect prediction. (c2019) by Moussa, Rebecca

    Published 2019
    “…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 265

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis by Nisreen Said Amer (17984077)

    Published 2024
    “…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
  6. 266

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…Models analyzing images at the architectural level yielded higher accuracy (94.7 %), sensitivity (94.1 %), and specificity (98.2 %) compared to cellular-level analysis. …”
  7. 267

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …”
    Get full text
    Get full text
    masterThesis
  8. 268

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks by Yassine Himeur (14158821)

    Published 2022
    “…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. …”
  9. 269

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  10. 270

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …”
  11. 271

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
  12. 272

    Artificial intelligence models for predicting the mode of delivery in maternal care by Rawan AlSaad (14159019)

    Published 2025
    “…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …”
  13. 273

    Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges by Sk Injamamul Islam (14111241)

    Published 2024
    “…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …”
  14. 274

    An intelligent EPROM silicon compiler by Amin, A.

    Published 1991
    “…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…”
    Get full text
    Get full text
    article
  15. 275

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
  16. 276

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 277
  18. 278
  19. 279

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 280