Search alternatives:
processing algorithm » processing algorithms (Expand Search)
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
meta learning » deep learning (Expand Search)
element » elements (Expand Search)
Showing 61 - 80 results of 158 for search '(((( meta learning algorithm ) OR ( image processing algorithm ))) OR ( element method algorithm ))', query time: 0.15s Refine Results
  1. 61

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  2. 62

    Animal migration optimization algorithm: novel optimizer, analysis, and applications by Abualigah, Laith

    Published 2024
    “…It is based on the animal actions and habits in migration seasons. Optimization algorithms are applied to find the optimal solutions in many domains and fields such as image processing, machine learning, and others. …”
    Get full text
  3. 63
  4. 64

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children by Jayakanth, Kunhoth

    Published 2023
    “…Dysgraphia is a neurological disorder that hinders the acquisition process of normal writing skills in children, resulting in poor writing abilities. …”
    Get full text
    Get full text
    Get full text
    article
  5. 65

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children by Jayakanth Kunhoth (14158908)

    Published 2023
    “…<p dir="ltr">Dysgraphia is a neurological disorder that hinders the acquisition process of normal writing skills in children, resulting in poor writing abilities. …”
  6. 66

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  7. 67

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 68

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 69

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 70

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
    Get full text
    article
  11. 71

    Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review by Yosra Magdi Mekki (21673721)

    Published 2025
    “…Studies were included if they focused on the application of AI in US imaging for CTS diagnosis. Editorials, expert opinions, conference papers, dataset publications, and studies that did not have a clear clinical application of the AI algorithm were excluded.…”
  12. 72

    Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models by Theng, Lau Wei

    Published 2022
    “…Pre-processing on the dataset is required to standardize the dataset by resizing the image into 224 * 224 pixels, convert into jpg format and augmentation. …”
    Get full text
  13. 73

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
  14. 74
  15. 75
  16. 76
  17. 77

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Data-driven approaches, such as machine learning (ML), particularly deep learning (DL), have shown promising results. …”
    Get full text
  18. 78
  19. 79
  20. 80

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”