Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 181 - 200 results of 220 for search '(( element data algorithm ) OR ((( data existing algorithm ) OR ( image processing algorithm ))))', query time: 0.09s Refine Results
  1. 181

    ISSP by Zouein, P.P.

    Published 2017
    “…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 182

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance by Amr Zeedan (17983750)

    Published 2023
    “…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …”
  3. 183

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…In this paper, we address multimedia database fragmentation by extending existing fragmentation algorithms to take into account key characteristics of multimedia objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 184
  5. 185

    Next-generation energy systems for sustainable smart cities: Roles of transfer learning by Yassine Himeur (14158821)

    Published 2022
    “…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …”
  6. 186
  7. 187

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
  8. 188

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
  9. 189

    Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization by Yassine Himeur (14158821)

    Published 2023
    “…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …”
  10. 190

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
    Get full text
    Get full text
    article
  11. 191

    Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models by AL SHAMSI, ARWA AHMED

    Published 2023
    “…The study of thoughts, feelings, judgments, values, attitudes, and emotions regarding goods, services, organizations, persons, tasks, occasions, titles, and their attributes is known as sentiment analysis and it involves a polarity classification task for recognizing positive, negative, or neutral text to quantify what individuals believe using textual qualitative data. The rise of social media platforms provided an excellent source for sentiment analysis data. …”
    Get full text
  12. 192

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System by Mohd Imran (12249782)

    Published 2025
    “…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
  13. 193

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 194

    A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education by Abu Zitar, Raed

    Published 2022
    “…Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
    Get full text
  15. 195

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care by Regina Padmanabhan (14231606)

    Published 2022
    “…The XGboost algorithm is suggested from 10-fold cross-validation on 6 candidate models. …”
  16. 196
  17. 197

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care by Barry Solaiman (19160614)

    Published 2024
    “…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …”
  18. 198
  19. 199
  20. 200

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text