Showing 161 - 180 results of 197 for search '(( elements method algorithm ) OR ((( data making algorithm ) OR ( neural coding algorithm ))))*', query time: 0.09s Refine Results
  1. 161

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 162

    Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information by M. Ghoniem, Rania

    Published 2019
    “…In all likelihood, while features from several modalities may enhance the classification performance, they might exhibit high dimensionality and make the learning process complex for the most used machine learning algorithms. …”
    Get full text
    Get full text
  3. 163

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
    Get full text
    Get full text
    masterThesis
  4. 164

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects by Mohamed Massaoudi (16888710)

    Published 2021
    “…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …”
  5. 165

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”
  6. 166

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
  7. 167
  8. 168

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
  9. 169

    PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning by Gabriele Oligeri (14151426)

    Published 2022
    “…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …”
  10. 170

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  11. 171

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 172

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  13. 173

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) by Fares Almomani (12585685)

    Published 2020
    “…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
  14. 174
  15. 175

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 176
  17. 177
  18. 178

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  19. 179
  20. 180