Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
based models » based modeling (Expand Search)
Showing 661 - 680 results of 760 for search '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( based models algorithm ))))', query time: 0.12s Refine Results
  1. 661

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
  2. 662

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis by Ghada Al-Hussain (18295426)

    Published 2022
    “…<h3>Background</h3><p dir="ltr">When investigating voice disorders a series of processes are used when including voice screening and diagnosis. …”
  3. 663
  4. 664

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  5. 665

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 666

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier by JAIN, SWETA

    Published 2023
    “…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …”
    Get full text
    Get full text
  7. 667

    Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 668

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …”
    Get full text
  9. 669

    Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog... by Mutasim Baba, Fuad

    Published 2023
    “…The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
    Get full text
    Get full text
    Get full text
  10. 670

    Robustness testing of composed real-time systems by Fouchal, Hacène

    Published 2010
    “…In this paper, we suggest a methodology for testing robustness of Real-Time Component-Based Systems (RTCBS). A RTCBS system is described as a collection of components where each component is modeled as a Timed Input-Output Automaton (TIOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 671

    A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education by Abu Zitar, Raed

    Published 2022
    “…The main aim of this paper is to map the relationship between teaching practices and student learning based on emotional impact. Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
    Get full text
  12. 672

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …”
  13. 673

    A machine learning approach for localization in cellular environments by Abdallah, Ali A.

    Published 2018
    “…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 674

    Identification of phantom movements with an ensemble learning approach by Akhan Akbulut (17380285)

    Published 2022
    “…Our study demonstrated that the ensemble learning-based models resulted in higher accuracy in the detection of phantom movements. …”
  15. 675

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
  16. 676

    Systematic reviews in sentiment analysis: a tertiary study by Alexander Ligthart (14150871)

    Published 2022
    “…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
  17. 677

    Development of a cerebral aneurysm segmentation method to prevent sentinel hemorrhage by Yousra Regaya (17788964)

    Published 2023
    “…Here, we present a method combining a multiresolution and a statistical approach in two dimensional domain to segment cerebral aneurysm in which the Contourlet transform (CT) extracts the image features, while the Hidden Markov Random Field with Expectation Maximization (HMRF-EM) segments the image, based on the spatial contextual constraints. The proposed algorithm is tested on Three-Dimensional Rotational Angiography (3DRA) datasets; the average values of segmentation accuracy, DSC, FPR, FNR, specificity, and sensitivity, are found to be 99.72%, 93.52%, 0.07%, 5.23%, 94.77%, and 99.96%, respectively.…”
  18. 678

    Design and implementation of a deep learning-empowered m-Health application by Akhan Akbulut (17380285)

    Published 2023
    “…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. The final phase displays the confidence rates on the mobile application. …”
  19. 679

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…Gravitational Search Algorithm (GSA) is developed to search for optimal settings of the proposed controller. …”
    Get full text
    masterThesis
  20. 680

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”