Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
-
341
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
342
-
343
-
344
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …”
-
345
-
346
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
347
-
348
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …”
Get full text
article -
349
RFID localization using single reader antenna. (c2014)
Published 2016“…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
Get full text
Get full text
masterThesis -
350
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
351
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
-
352
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
Get full text
-
353
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
354
-
355
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
356
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…”
Get full text
article -
357
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The proposed design achieves an average throughput of 163.24 Gbps, exceeding throughputs of reported hardware-based classifiers that use comparable approaches, which in turn ensures the continuity of realtime traffic classification at congested data centers.…”
Get full text
article -
358
Extreme Early Image Recognition Using Event-Based Vision
Published 2023“…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
-
359
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
360