Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
elements ii » elements _ (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
elements ii » elements _ (Expand Search)
-
161
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The proposed framework involves the hardware, software, algorithms, and system specification requirements. Further, it provides a detailed end-to-end systems integration and transaction flow between the account-based ticketing, face recognition, and banking systems. …”
Get full text
-
162
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
163
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
164
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …”
-
165
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …”
-
166
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
-
167
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…The main aim of this paper is to map the relationship between teaching practices and student learning based on emotional impact. Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
Get full text
-
168
Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system
Published 2018“…The proposed algorithms are based on feature extraction (vector crossing, zoning, combined zoning, and vector crossing) and template matching techniques. …”
-
169
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
article -
170
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
171
Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms
Published 2025“…UAV swarms are increasingly employed to monitor ground-based IIoT devices in smart cities, offering valuable support to situation-awareness IoT applications, such as surveillance, traffic management, and emergency response. …”
-
172
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
173
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
Published 2023“…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
-
174
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
Get full text
Get full text
Get full text
article -
175
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
Get full text
Get full text
Get full text
article -
176
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
177
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
178
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
-
179
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”