Search alternatives:
processing algorithm » processing algorithms (Expand Search)
setting algorithm » scheduling algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
processing algorithm » processing algorithms (Expand Search)
setting algorithm » scheduling algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
-
221
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
Published 2018“…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
Get full text
Get full text
Get full text
Get full text
article -
222
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
223
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
-
224
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
225
EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach
Published 2019“…The BoDF model achieves 93.8% accuracy in the SEED data set and 77.4% accuracy in the DEAP data set, which is more accurate compared to other state-of-the-art methods of human emotion recognition.…”
-
226
High-order parametrization of the hypergeometric-Meijer approximants
Published 2023“…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …”
-
227
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
228
Automated skills assessment in open surgery: A scoping review
Published 2025“…In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …”
-
229
-
230
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
231
-
232
-
233
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
Get full text
article -
234
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
235
Competitive learning/reflected residual vector quantization for coding angiogram images
Published 2003“…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
Get full text
Get full text
article -
236
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
Published 2018“…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …”
Get full text
-
237
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
Get full text
-
238
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
239
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…They consist of many processing nodes that interact by sending messages (containing both data and synchronization information) over a communication link, between nodes. …”
Get full text
Get full text
article -
240