Search alternatives:
processing algorithm » processing algorithms (Expand Search)
would algorithm » mould algorithm (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
would algorithm » mould algorithm (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
element » elements (Expand Search)
-
701
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
-
702
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
Published 2024“…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
-
703
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. Since the introduction of the Lee sigma filter in 1980, the various versions of the minimum mean square error (MMSE) filter were developed, focusing essentially on how to estimate the processed pixels. …”
Get full text
article -
704
Diagnostic test accuracy of AI-assisted mammography for breast imaging: a narrative review
Published 2025“…Artificial intelligence (AI), with its ability to process vast amounts of data and detect intricate patterns, offers a solution to the limitations of traditional mammography, including missed diagnoses and false positives. …”
-
705
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…<div><p>Outpatient Chemotherapy Appointment (OCA) planning and scheduling is a process of distributing appointments to available days and times to be handled by various resources through a multi-stage process. …”
-
706
FoGMatch
Published 2019“…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
707
-
708
MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network
Published 2022“…Leave-one-out cross-validation method was used in this work. The performance of the deep learning models is measured using three well-known performance matrices viz. mean absolute error (MAE)-based construction error, the difference in the signal-to-noise ratio (ΔSNR), and percentage reduction in motion artifacts (<i>η</i>). …”
-
709
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
Get full text
Get full text
masterThesis -
710
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
711
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”
-
712
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The complexity is the same as for classical algorithms, but an improved convergence rate, a reduced size of the problem and a sparse Jacobian matrix are obtained. …”
Get full text
Get full text
Get full text
article -
713
Approximate XML structure validation technical report
Published 2014“…Our method also inherently performs exact validation by imposing a maximum similarity threshold (minimum edit distance) on the returned results. …”
Get full text
Get full text
Get full text
article -
714
Fine-grain watermarking for intellectual property protection
Published 2019“…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …”
-
715
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
Published 2023“…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
-
716
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
717
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…We combine features from all three modes of MMF-NIOM to achieve a state-of-the-art non-intrusive occupancy classification performance of 91.5 % accuracy and 91.5 % f1-score, approximately, by an ensemble of fine-tuned classifiers on the electricity consumption & occupancy (ECO) dataset. The proposed method is sustainable, robust, adaptable to various households, and can be mass-implemented within smart meters at a much lower cost and effort compared to the traditional internet of things (IoT)-based intrusive systems.…”
-
718
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Published 2023“…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”
Get full text
Get full text
Get full text
article -
719
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”