Showing 681 - 700 results of 892 for search '(( data using algorithm ) OR ((( developing based algorithm ) OR ( elements colon algorithm ))))', query time: 0.12s Refine Results
  1. 681

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …”
  2. 682

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. …”
  3. 683

    Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle by Korkmaz, Jessica

    Published 2025
    “…The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 684

    Local convexity preserving rational cubic spline curves by Sarfraz, M.

    Published 1997
    “…An algorithm is presented which constructs a curve by interpolating the given data points. …”
    Get full text
    Get full text
    article
  5. 685

    On sensor selection in mobile devices based on energy, application accuracy, and context metrics by Taleb, Sireen

    Published 2013
    “…We use this algorithm to build a sensor selection model to choose among location sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 686
  7. 687

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 688

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  9. 689
  10. 690

    Particle swarm optimization for multimachine power systemstabilizer design by Abido, A.A.

    Published 2001
    “…In this paper, a novel evolutionary algorithm based approach to optimal design of multimachine power system stabilizers (PSSs) is proposed. …”
    Get full text
    Get full text
    article
  11. 691

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
    Get full text
    Get full text
    article
  12. 692

    Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique by Al-Garni, Ahmed Z.

    Published 2006
    “…Six years of data are used for model building and validation. …”
    Get full text
    article
  13. 693

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 694

    Generic metadata representation framework for social-based event detection, description, and linkage by Abebe, Minale A.

    Published 2020
    “…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 695

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques by Joao Palotti (8479842)

    Published 2019
    “…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …”
  16. 696
  17. 697

    Noise-Robust Parameter Estimation Of Linear Systems by Emara-Shabaik, Husam

    Published 2020
    “…In this paper, a recursive parameters stimation algorithm, which is unbiased for a wide class of measurement noise, is developed. …”
    Get full text
    article
  18. 698

    Parallel processing by Mansour, Nashat

    Published 2005
    “…Parallel algorithms, based on simulated annealing, neural networks and genetic algorithms, for mapping irregular data to multicomputers are presented and compared. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 699

    Toward automatic motivator selection for autism behavior intervention therapy by Siyam, Nur

    Published 2022
    “…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …”
    Get full text
    Get full text
  20. 700