Search alternatives:
differences may » differences _ (Expand Search)
among algorithm » colony algorithm (Expand Search)
may algorithm » jaya algorithm (Expand Search), rd algorithm (Expand Search)
Showing 81 - 100 results of 127 for search '(( differences may algorithm ) OR ( differences among algorithm ))', query time: 0.09s Refine Results
  1. 81

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques by Arifa Zahir (20748764)

    Published 2024
    “…Various Deep Learning algorithms, including Convolution Neural Network (CNN), LeNet, and Inception-V3 are implemented to classify the records and extract various patterns. …”
  2. 82
  3. 83
  4. 84

    Automatic image quality evaluation in digital radiography using for‐processing and for‐presentation images by Ioannis A. Tsalafoutas (14776939)

    Published 2024
    “…<h3>Purpose</h3><p dir="ltr">To investigate the impact of digital image post‐processing algorithms on various image quality (IQ) metrics of radiographic images under different exposure conditions.…”
  5. 85
  6. 86

    Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels by Bernard J. Jansen (7434779)

    Published 2023
    “…<p dir="ltr">Although the effect of hyperparameters on algorithmic outputs is well known in machine learning, the effects of hyperparameters on information systems that produce user or customer segments are relatively unexplored. …”
  7. 87
  8. 88
  9. 89

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
  10. 90

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 91

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…Although the evidence uncovered in this study shows promising applications of AI-driven serious games, larger and more rigorous, diverse, and robust studies may be needed to examine the efficacy and effectiveness of AI-driven serious games in different populations with different health conditions.…”
  12. 92

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Based on titles and abstracts alone, we were able to identify 1515 surveys, 733 systematic reviews, 512 cohort studies, 480 meta-analyses, and 362 randomized control trials. We identified 19 different topics covered among the publications reviewed. …”
  13. 93

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
    Get full text
  14. 94

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  15. 95

    An Anchor-Based Localization in Underwater Wireless Sensor Networks for Industrial Oil Pipeline Monitoring by Nitin Goyal (7876730)

    Published 2022
    “…In this article, the localization of these leakages is performed by using range-based metrics for calculating the distance among anchor nodes (ANs) and target nodes (TNs). …”
  16. 96
  17. 97

    BIT-SLICE MICROPROCESSOR-BASED COMMUNICATIONS DECODER by SOOMRO, AA

    Published 2020
    “…A buffer memory stores incoming blocks as more than one block may be received during a decoding cycle. The design is versatile: different decoding algorithms can be executed by changing the microprogram. …”
    Get full text
    article
  18. 98

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 99

    A GENERAL REAL-TIME DECODER BASED ON AMD2900 DEVICES by SOOMRO, AA

    Published 2020
    “…Therefore, a buffer memory is used to store incoming blocks as more than one block may be received during a decoding cycle. The design is versatile since different decoding algorithms can be executed by changing the microprogram. …”
    Get full text
    article
  20. 100

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…This study also focuses on the use of wireless sensor networks in different fields. Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”