Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
fusion algorithm » auction algorithm (Expand Search), cosine algorithm (Expand Search)
Showing 61 - 80 results of 150 for search '(( elements method algorithm ) OR ((( image processing algorithm ) OR ( data fusion algorithm ))))', query time: 0.11s Refine Results
  1. 61

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  2. 62

    A Parallel Algorithm for Inverse Halftoning and its Hardware Implementation by Siddiqi, Umair F.

    Published 2020
    “…Keywords: (1) Inverse Halftoning (2) Hardware Implementation (3) Look-Up Table Inverse Halftoning (4) Complex Programmable Logic Devices (CPLD) (5) Image Processing…”
    Get full text
    article
  3. 63

    Animal migration optimization algorithm: novel optimizer, analysis, and applications by Abualigah, Laith

    Published 2024
    “…It is based on the animal actions and habits in migration seasons. Optimization algorithms are applied to find the optimal solutions in many domains and fields such as image processing, machine learning, and others. …”
    Get full text
  4. 64
  5. 65

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  6. 66

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
    Get full text
    article
  7. 67

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 68

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…We present experimental results that demonstrate the effectiveness of our method while outperforming reported techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 69

    Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review by Yosra Magdi Mekki (21673721)

    Published 2025
    “…Studies were included if they focused on the application of AI in US imaging for CTS diagnosis. Editorials, expert opinions, conference papers, dataset publications, and studies that did not have a clear clinical application of the AI algorithm were excluded.…”
  10. 70

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 71

    Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models by Theng, Lau Wei

    Published 2022
    “…Pre-processing on the dataset is required to standardize the dataset by resizing the image into 224 * 224 pixels, convert into jpg format and augmentation. …”
    Get full text
  12. 72

    A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates by Andrianarison, O.

    Published 2024
    “…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …”
    Get full text
    article
  13. 73

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
  14. 74
  15. 75

    Enhancing Personalized Learning Experiences through AI-driven Analysis of xAPI Data by ODEH, HANEEN

    Published 2024
    “…The Experience API (xAPI) provides a comprehensive mechanism to document all types of learning interactions, storing this stream of data into the Learning Record Store (LRS). This dissertation explores the fusion of Artificial Intelligence (AI) techniques with the obtained xAPI data. …”
    Get full text
  16. 76
  17. 77
  18. 78

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”
  19. 79
  20. 80