Search alternatives:
processing algorithm » processing algorithms (Expand Search)
would algorithm » mould algorithm (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
element » elements (Expand Search)
Showing 701 - 719 results of 719 for search '(( element would algorithm ) OR ((( data processing algorithm ) OR ( based methods algorithm ))))', query time: 0.12s Refine Results
  1. 701

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
  2. 702

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
  3. 703

    Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter by Yahia, Mohamed

    Published 2020
    “…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. Since the introduction of the Lee sigma filter in 1980, the various versions of the minimum mean square error (MMSE) filter were developed, focusing essentially on how to estimate the processed pixels. …”
    Get full text
    article
  4. 704

    Diagnostic test accuracy of AI-assisted mammography for breast imaging: a narrative review by Daksh Dave (17949239)

    Published 2025
    “…Artificial intelligence (AI), with its ability to process vast amounts of data and detect intricate patterns, offers a solution to the limitations of traditional mammography, including missed diagnoses and false positives. …”
  5. 705

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…<div><p>Outpatient Chemotherapy Appointment (OCA) planning and scheduling is a process of distributing appointments to available days and times to be handled by various resources through a multi-stage process. …”
  6. 706

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 707
  8. 708

    MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network by Sakib Mahmud (15302404)

    Published 2022
    “…Leave-one-out cross-validation method was used in this work. The performance of the deep learning models is measured using three well-known performance matrices viz. mean absolute error (MAE)-based construction error, the difference in the signal-to-noise ratio (ΔSNR), and percentage reduction in motion artifacts (<i>η</i>). …”
  9. 709

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
    Get full text
    Get full text
    masterThesis
  10. 710
  11. 711

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”
  12. 712

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The complexity is the same as for classical algorithms, but an improved convergence rate, a reduced size of the problem and a sparse Jacobian matrix are obtained. …”
    Get full text
    Get full text
    Get full text
    article
  13. 713

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…Our method also inherently performs exact validation by imposing a maximum similarity threshold (minimum edit distance) on the returned results. …”
    Get full text
    Get full text
    Get full text
    article
  14. 714

    Fine-grain watermarking for intellectual property protection by Stefano Giovanni Rizzo (18615112)

    Published 2019
    “…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …”
  15. 715

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  16. 716
  17. 717

    Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters by Sakib Mahmud (15302404)

    Published 2025
    “…We combine features from all three modes of MMF-NIOM to achieve a state-of-the-art non-intrusive occupancy classification performance of 91.5 % accuracy and 91.5 % f1-score, approximately, by an ensemble of fine-tuned classifiers on the electricity consumption & occupancy (ECO) dataset. The proposed method is sustainable, robust, adaptable to various households, and can be mass-implemented within smart meters at a much lower cost and effort compared to the traditional internet of things (IoT)-based intrusive systems.…”
  18. 718

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”
    Get full text
    Get full text
    Get full text
    article
  19. 719

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”