Search alternatives:
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
Showing 601 - 620 results of 620 for search '(( elements method algorithm ) OR ((( data detection algorithm ) OR ( based methods algorithm ))))', query time: 0.14s Refine Results
  1. 601

    An Iterative Heuristic for State Justi�cation in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we adopt a hybrid approach for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justifcation sequences vector by vector. …”
    Get full text
    article
  2. 602

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability by Farah R. Zahir (18892108)

    Published 2017
    “…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
  3. 603

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  4. 604

    Fuzzy controllers design using space-filling curves by Elshafei-Ahmed, M.

    Published 1998
    “…We present a clustering technique for fuzzy rules based on Hilbert space-filling curves (SFC). SFC scans an n-dimensional space and reduces it to a curve, i.e. a one-dimensional line. …”
    Get full text
    Get full text
    article
  5. 605

    Fuzzy Controllers Design Using Space-Filling Curves by Elshafei-Ahmed, M

    Published 2020
    “…The paper introduces first the Hilber Space-filling curves, and outlines algorithms for clustering and adaptive clustering which demonstrate the SFC efficient self-organizing features. …”
    Get full text
    article
  6. 606

    Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications by Abdallah Falah Mohammad Aldwekat (22457821)

    Published 2025
    “…</p><h3>Materials and methods</h3><p dir="ltr">An ensemble<u> species distribution modelling </u>approach, integrating regression-based and machine-learning algorithms (GLM, GBM, RF, MaxEnt), was used to project habitat suitability (Current time and by 2050, 2070, and 2090). …”
  7. 607

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…Similarly, it offers an improvement of 1 % in STOI and a reduction of 33 and 200 times, respectively, in network size and training epochs when compared to a complex variational U-Net-based model. Also, with comparable PESQ, the proposed system offers almost 2 % improvement in STOI, and a 2 times reduction in network size and 100 times reduction in training epochs, when compared to a lightweight system using automatic dimension reduction of network layers by a structured pruning method.…”
  8. 608

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis by Nisreen Said Amer (17984077)

    Published 2024
    “…Our study demonstrates the effectiveness of the FBFT method, achieving impressive accuracies across multiple brain disorders using CNN-based classification. …”
  9. 609
  10. 610

    Copy number variations in the genome of the Qatari population by Khalid A. Fakhro (3158862)

    Published 2015
    “…CNVs were detected in 97 unrelated Qatari individuals by running two calling algorithms on each of two primary datasets: high-resolution genotyping (Illumina Omni 2.5M) and high depth whole-genome sequencing (Illumina PE 100bp). …”
  11. 611
  12. 612

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
  13. 613

    MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network by Sakib Mahmud (15302404)

    Published 2022
    “…Leave-one-out cross-validation method was used in this work. The performance of the deep learning models is measured using three well-known performance matrices viz. mean absolute error (MAE)-based construction error, the difference in the signal-to-noise ratio (ΔSNR), and percentage reduction in motion artifacts (<i>η</i>). …”
  14. 614

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”
  15. 615

    Fine-grain watermarking for intellectual property protection by Stefano Giovanni Rizzo (18615112)

    Published 2019
    “…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …”
  16. 616

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  17. 617

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”
    Get full text
    Get full text
    Get full text
    article
  18. 618

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”
  19. 619

    ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints by Mohammed Al Disi (16855407)

    Published 2018
    “…Compressive sensing (CS) has been explored as a method to extend the battery lifetime of medical wearable devices. …”
  20. 620