Search alternatives:
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
-
121
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
122
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
123
Supervised term-category feature weighting for improved text classification
Published 2022“…Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …”
Get full text
Get full text
Get full text
Get full text
article -
124
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…The results show that with masking-based targets, the colored spectrograms provide an improvement of 0.12 points in perceptual evaluation of speech quality (PESQ) score, 4 % in short time objective intelligibility (STOI), and a 163 times reduction in network learnable parameters, as compared to when they are processed by a mapping-based model using pix2pix generative adversarial network (GAN) followed by a feedforward regression neural network. …”
-
125
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
126
Power matching approach for GPS coverage extension
Published 2006“…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. Most DR systems, which compensate for GPS inaccuracies and frequent GPS signal obstructions, employ an odometer and a directional sensor. …”
Get full text
Get full text
Get full text
Get full text
article -
127
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
Published 2022“…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …”
-
128
A Terrain classification system for coseismic landslide hazard analysis: Lebanon, a case study
Published 2014“…Coseismic hazard is then calculated for each susceptible terrain class using a failure-mode-specific algorithm. Results from this method of hazard analysis are maps of terrain classes, coseismic hazard maps for individual mode of failure, and a composite hazard map.…”
Get full text
Get full text
Get full text
conferenceObject -
129
RFID localization using single reader antenna. (c2014)
Published 2016“…In this work we propose a novel RFID based Localization methodology. Our scheme is based on Power Map Matching algorithm. …”
Get full text
Get full text
masterThesis -
130
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
131
A Navigation System for Indoor/Outdoor Environments with an Unmanned Ground Vehicle (UGV)
Published 2015Get full text
doctoralThesis -
132
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
Get full text
-
133
Automated quantification of penile curvature using artificial intelligence
Published 2022“…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
-
134
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
135
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
136
-
137
-
138
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
article -
139
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
Get full text
article -
140
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
Get full text
article