Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
case finding » cam binding (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 189 for search '(( element data algorithm ) OR ((( image processing algorithm ) OR ( case finding algorithm ))))', query time: 0.12s Refine Results
  1. 161
  2. 162

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …”
  3. 163

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
  4. 164

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis by Nisreen Said Amer (17984077)

    Published 2024
    “…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
  5. 165

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  6. 166

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …”
  7. 167
  8. 168

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
  9. 169

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…Our objective is to find the minimum power that satisfies a specific SC for both cases. …”
  10. 170

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
  11. 171

    AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients by Azar, Danielle

    Published 2015
    “…In this paper, we propose and compare three techniques two of which are Artificial Intelligence techniques, namely C4.5 and Case-Based Reasoning, and the third one is a meta-heuristic namely genetic algorithms. …”
    Get full text
    Get full text
    article
  12. 172

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The second case was 6-classes classification which consists of six different cyberbullying types. …”
    Get full text
  13. 173

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  14. 174

    Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort by Mohamed Adil Shah Khoodoruth (14589828)

    Published 2024
    “…The Random Forest model, a supervised machine learning algorithm, efficiently differentiated between cases and controls and between TRS and NTRS, with accuracies of 86.87 % and 88.41 %, respectively. …”
  15. 175

    BioNetApp: An interactive visual data analysis platform for molecular expressions by Ali M. Roumani (18615124)

    Published 2019
    “…This study case demonstrates the effectiveness of the BioNetApp software as an interactive visual analysis tool for molecular expression data in systems biology. …”
  16. 176

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
    Get full text
    Get full text
    Get full text
    article
  17. 177

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  18. 178

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  19. 179

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  20. 180