Showing 41 - 56 results of 56 for search 'data (augmentations OR (fragmentation OR segmentation)) (algorithms OR algorithm)', query time: 0.10s Refine Results
  1. 41

    A New Approach for Recognizing Saudi Arabian License Plates using Neural Networks by Deriche, Mohamed

    Published 2020
    “…Finally, a Multilayer Feedforward Neural Network (MFNN) with a backpropagation (BP) algorithm is used for character recognition. We discuss new features from the characters for training the NN. …”
    Get full text
    article
  2. 42

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  3. 43

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features by Mariam Bahameish (19255789)

    Published 2024
    “…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …”
  4. 44
  5. 45

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …”
  6. 46

    Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration by Al-Yamani, A.

    Published 0000
    “…This paper presents segmented addressable scan (SAS), a test architecture that addresses test data volume, test application time, test power consumption, and tester channel requirements using a hardware overhead of a few gates per scan chain. …”
    Get full text
    Get full text
    article
  7. 47

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) by Stamboulian, Mouses Hrag

    Published 2015
    “…Results obtained by our algorithm are compared with other homology modeling approaches as well as a pure ab-initio and a fragment based assembly approach. …”
    Get full text
    Get full text
    masterThesis
  8. 48
  9. 49

    Local convexity preserving rational cubic spline curves by Sarfraz, M.

    Published 1997
    “…An algorithm is presented which constructs a curve by interpolating the given data points. …”
    Get full text
    Get full text
    article
  10. 50

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  11. 51

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
  12. 52

    Exploring Digital Competitiveness through Bayesian Belief Networks by Qazi, Abroon

    Published 2025
    “…Three states were assigned to variables—low, medium, and high performance—and the tree augmented naive Bayes (TAN) algorithm was applied to model interdependencies. …”
    Get full text
    article
  13. 53

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…We use a semantic-aware inverted index to allow semantic-aware search, result selection, and result ranking functionality. The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 54

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care by Regina Padmanabhan (14231606)

    Published 2022
    “…Other highlights are (1) a novel set of easily available features for the prediction of the aforementioned clinical complications and (2) the use of data augmentation methods and model-scoring-based hyperparameter tuning to address the problem of class disproportionality, a common challenge in medical datasets and often the reason behind poor event prediction rate of various predictive models reported so far. …”
  15. 55

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  16. 56

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”