Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
trained using » brines using (Expand Search)
element » elements (Expand Search)
Showing 41 - 60 results of 294 for search '(( element method algorithm ) OR ((( image processing algorithm ) OR ( trained using algorithm ))))', query time: 0.14s Refine Results
  1. 41

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  2. 42

    Web Based Online Hybrid Teaching Method of Network Music Course by Abu Zitar, Raed

    Published 2022
    “…Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …”
    Get full text
  3. 43

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
    Get full text
  4. 44

    Limiting the Collection of Ground Truth Data for Land Use and Land Cover Maps with Machine Learning Algorithms by Usman Ali (6586886)

    Published 2022
    “…This paper aimed at evaluating the efficiency of machine learning (ML) in limiting the use of ground truth data for LULC maps. This was accomplished by (1) extracting reliable LULC information from Sentinel-2 and Landsat-8 s images, (2) generating remote sensing indices used to train ML algorithms, and (3) comparing the results with ground truth data. …”
  5. 45

    A map matching approach for train positioning. Part I: Development and analysis by Saab, Samer S.

    Published 2000
    “…Consequently, track signatures, such as curves, are difficult to identify using low-cost sensors. The algorithm proposed in this work takes full advantage of the inherited "one-dimensional" (1-D) train track profile. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 46

    A map matching approach for train positioning. Part II: Application and Experimentation by Saab, Samer S.

    Published 2000
    “…In addition, experimental results, using a quartz yaw rate sensor and axle encoders aboard a freight train, are included to show the performance of the proposed map matching algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 47
  8. 48
  9. 49

    Unsupervised histogram based color image segmentation by Chenaoua, K.S.

    Published 2003
    “…Histograms are then computed, smoothed and downsampled. A peak picking algorithm finds the predominant peaks in the histograms. …”
    Get full text
    Get full text
    article
  10. 50
  11. 51

    AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques by Khalid, Naji

    Published 2023
    “…Internet of Things (IoT) and Artificial Intelligence (AI) technologies are currently replacing the traditional methods of handling buildings, infrastructure, and facilities design, control, and maintenance due to their precision and ease of use. This paper proposes a novel automated algorithm for the health monitoring of concrete column base cover degradation based on IoT and the state-of-the-art deep learning framework, Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Get full text
    article
  12. 52

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  13. 53

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  14. 54

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  15. 55

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
  16. 56
  17. 57
  18. 58

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  19. 59

    Spider monkey optimizations: application review and results by Abualigah, Laith

    Published 2024
    “…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
    Get full text
  20. 60

    Competitive learning/reflected residual vector quantization for coding angiogram images by Mourn, W.A.H.

    Published 2003
    “…It was found that it has a higher probability to diverge when used with nonGaussian and nonLaplacian image sources such as angiogram images. By employing competitive learning neural network in the codebook design process, we tried to obtain a stable and convergent algorithm. …”
    Get full text
    Get full text
    article