Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
case finding » cam binding (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
case finding » cam binding (Expand Search)
element » elements (Expand Search)
-
161
-
162
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …”
-
163
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
-
164
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
-
165
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
166
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …”
-
167
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
168
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
169
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…Our objective is to find the minimum power that satisfies a specific SC for both cases. …”
-
170
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
Published 2021“…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
-
171
AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients
Published 2015“…In this paper, we propose and compare three techniques two of which are Artificial Intelligence techniques, namely C4.5 and Case-Based Reasoning, and the third one is a meta-heuristic namely genetic algorithms. …”
Get full text
Get full text
article -
172
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The second case was 6-classes classification which consists of six different cyberbullying types. …”
Get full text
-
173
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
174
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
Published 2024“…The Random Forest model, a supervised machine learning algorithm, efficiently differentiated between cases and controls and between TRS and NTRS, with accuracies of 86.87 % and 88.41 %, respectively. …”
-
175
BioNetApp: An interactive visual data analysis platform for molecular expressions
Published 2019“…This study case demonstrates the effectiveness of the BioNetApp software as an interactive visual analysis tool for molecular expression data in systems biology. …”
-
176
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
Get full text
Get full text
Get full text
article -
177
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
178
New aspect-oriented constructs for security hardening concerns
Published 2009“…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
179
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
180
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis