Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements new » elements _ (Expand Search), elementi per (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements new » elements _ (Expand Search), elementi per (Expand Search)
-
141
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…The collection of digital images for monitoring underwater habitats, such as seagrass meadows, has increased significantly as recent progress in imaging technology has made it easier to collect high-resolution data. …”
-
142
Automated quantification of penile curvature using artificial intelligence
Published 2022“…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
-
143
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022“…The proposed solutions are compared with existing works based on an SIFT flow algorithm that uses CNN features. …”
Get full text
article -
144
A Navigation System for Indoor/Outdoor Environments with an Unmanned Ground Vehicle (UGV)
Published 2015Get full text
doctoralThesis -
145
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…Different metrics to quantitatively evaluate the performance of each algorithm in terms of accuracy and latency were computed and overall comparison is presented. …”
-
146
-
147
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
148
Development of a cerebral aneurysm segmentation method to prevent sentinel hemorrhage
Published 2023“…Here, we present a method combining a multiresolution and a statistical approach in two dimensional domain to segment cerebral aneurysm in which the Contourlet transform (CT) extracts the image features, while the Hidden Markov Random Field with Expectation Maximization (HMRF-EM) segments the image, based on the spatial contextual constraints. …”
-
149
Design and implementation of a deep learning-empowered m-Health application
Published 2023“…In the first phase, the corresponding image is extracted and sent to a web service. Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. …”
-
150
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
151
Spatiotemporal Mapping and Monitoring of Mangrove Forests Changes From 1990 to 2019 in the Northern Emirates, UAE Using Random Forest, Kernel Logistic Regression and Naive Bayes Tr...
Published 2020“…The approach was developed based on random forest (RF), Kernel logistic regression (KLR), and Naive Bayes Tree machine learning algorithms which use multitemporal Landsat images. …”
Get full text
article -
152
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
153
-
154
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. This app uses key stroke-related timelines including the last time the patient was known to be well, patient location, treatment options, and imaging availability at different health care facilities.…”
-
155
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
156
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…Researchers are also developing various techniques for detecting and analyzing <u>mobile malware</u> to overcome these issues. As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …”
-
157
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
Get full text
article -
158
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The proposed framework involves the hardware, software, algorithms, and system specification requirements. Further, it provides a detailed end-to-end systems integration and transaction flow between the account-based ticketing, face recognition, and banking systems. …”
Get full text
-
159
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
160
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
Published 2023“…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …”