Showing 121 - 140 results of 151 for search '(( element method algorithm ) OR ((( data code algorithm ) OR ( based mapping algorithm ))))*', query time: 0.10s Refine Results
  1. 121

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  2. 122

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  3. 123

    Supervised term-category feature weighting for improved text classification by Attieh, Joseph

    Published 2022
    “…Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 124

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…The results show that with masking-based targets, the colored spectrograms provide an improvement of 0.12 points in perceptual evaluation of speech quality (PESQ) score, 4 % in short time objective intelligibility (STOI), and a 163 times reduction in network learnable parameters, as compared to when they are processed by a mapping-based model using pix2pix generative adversarial network (GAN) followed by a feedforward regression neural network. …”
  5. 125

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  6. 126

    Power matching approach for GPS coverage extension by Saab, Samer S.

    Published 2006
    “…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. Most DR systems, which compensate for GPS inaccuracies and frequent GPS signal obstructions, employ an odometer and a directional sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 127

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation by Saqr Khalil Saeed Thabet (19517560)

    Published 2022
    “…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …”
  8. 128

    A Terrain classification system for coseismic landslide hazard analysis: Lebanon, a case study by Grant, Alex R.

    Published 2014
    “…Coseismic hazard is then calculated for each susceptible terrain class using a failure-mode-specific algorithm. Results from this method of hazard analysis are maps of terrain classes, coseismic hazard maps for individual mode of failure, and a composite hazard map.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 129

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…In this work we propose a novel RFID based Localization methodology. Our scheme is based on Power Map Matching algorithm. …”
    Get full text
    Get full text
    masterThesis
  10. 130

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  11. 131
  12. 132

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
    Get full text
  13. 133

    Automated quantification of penile curvature using artificial intelligence by Tariq O. Abbas (11247771)

    Published 2022
    “…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
  14. 134
  15. 135
  16. 136
  17. 137
  18. 138

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  19. 139

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  20. 140

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article