Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
based models » based modeling (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
based models » based modeling (Expand Search)
-
661
Extreme Early Image Recognition Using Event-Based Vision
Published 2023“…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
-
662
The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis
Published 2022“…<h3>Background</h3><p dir="ltr">When investigating voice disorders a series of processes are used when including voice screening and diagnosis. …”
-
663
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis -
664
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
665
Improving the security of SNMP in wireless networks
Published 2017“…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
666
Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier
Published 2023“…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …”
Get full text
Get full text
-
667
Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
668
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …”
Get full text
-
669
Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog...
Published 2023“…The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
Get full text
Get full text
Get full text
-
670
Robustness testing of composed real-time systems
Published 2010“…In this paper, we suggest a methodology for testing robustness of Real-Time Component-Based Systems (RTCBS). A RTCBS system is described as a collection of components where each component is modeled as a Timed Input-Output Automaton (TIOA). …”
Get full text
Get full text
Get full text
Get full text
article -
671
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…The main aim of this paper is to map the relationship between teaching practices and student learning based on emotional impact. Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
Get full text
-
672
Developing an online hate classifier for multiple social media platforms
Published 2020“…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …”
-
673
A machine learning approach for localization in cellular environments
Published 2018“…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
674
Identification of phantom movements with an ensemble learning approach
Published 2022“…Our study demonstrated that the ensemble learning-based models resulted in higher accuracy in the detection of phantom movements. …”
-
675
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
Published 2022“…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
-
676
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
-
677
Development of a cerebral aneurysm segmentation method to prevent sentinel hemorrhage
Published 2023“…Here, we present a method combining a multiresolution and a statistical approach in two dimensional domain to segment cerebral aneurysm in which the Contourlet transform (CT) extracts the image features, while the Hidden Markov Random Field with Expectation Maximization (HMRF-EM) segments the image, based on the spatial contextual constraints. The proposed algorithm is tested on Three-Dimensional Rotational Angiography (3DRA) datasets; the average values of segmentation accuracy, DSC, FPR, FNR, specificity, and sensitivity, are found to be 99.72%, 93.52%, 0.07%, 5.23%, 94.77%, and 99.96%, respectively.…”
-
678
Design and implementation of a deep learning-empowered m-Health application
Published 2023“…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. The final phase displays the confidence rates on the mobile application. …”
-
679
Online Control and Optimization of Directional Drilling
Published 2020“…Gravitational Search Algorithm (GSA) is developed to search for optimal settings of the proposed controller. …”
Get full text
masterThesis -
680
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”