Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
pre processing » _ processing (Expand Search), image processing (Expand Search)
data detection » data injection (Expand Search)
Showing 41 - 60 results of 229 for search '(( elements method algorithm ) OR ((( pre processing algorithm ) OR ( data detection algorithm ))))', query time: 0.14s Refine Results
  1. 41

    Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar by Sankaran, Rajendran

    Published 2022
    “…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …”
    Get full text
    Get full text
    Get full text
    article
  2. 42

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  9. 49
  10. 50

    A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation by Khaled Dhibi (16891524)

    Published 2021
    “…<p>This paper proposes a novel fault detection and diagnosis (FDD) technique for grid-tied PV systems. …”
  11. 51

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review by Avneet Kaur (712349)

    Published 2024
    “…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”
  12. 52

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm by Ayman Khallel Al-Ani (17541447)

    Published 2023
    “…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …”
  13. 53
  14. 54

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. It detects and simultaneously protects the IoMT network from further intrusion with only a 0.18% service interruption rate. …”
  15. 55

    Deep and transfer learning for building occupancy detection: A review and comparative analysis by Aya Nabil Sayed (17317006)

    Published 2022
    “…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …”
  16. 56

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…The proposed algorithm has successfully maintained homogeneity to the original data set, reduced the execution time and occupied storage space, and led to decent monitoring performance.…”
  17. 57

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  18. 58

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems by Faria Nawshin (21841598)

    Published 2025
    “…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …”
  19. 59

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
    Get full text
  20. 60

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject