Search alternatives:
segmentations » segmentation (Expand Search), sedimentation (Expand Search), fermentation (Expand Search)
augmentation » segmentation (Expand Search), fragmentation (Expand Search)
segmentations » segmentation (Expand Search), sedimentation (Expand Search), fermentation (Expand Search)
augmentation » segmentation (Expand Search), fragmentation (Expand Search)
-
61
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
-
62
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The road network is represented as a directed graph in which nodes are junctions (intersections) and edges are road segments. We assume that the city has deployed high-fidelity sensors for speed reading in a subset of edges; and the objective is to infer the speed readings for the remaining edges in the network; and to estimate the missing values in the segments for which sensors have stopped generating data due to technical problems (e.g., battery, network, etc.). …”
-
63
-
64
-
65
-
66
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
67
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
Published 2022“…Other highlights are (1) a novel set of easily available features for the prediction of the aforementioned clinical complications and (2) the use of data augmentation methods and model-scoring-based hyperparameter tuning to address the problem of class disproportionality, a common challenge in medical datasets and often the reason behind poor event prediction rate of various predictive models reported so far. …”
-
68
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…It can be further scaled (for instance, in time) to clinical summary documentation. Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
-
69
-
70
-
71
Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration
Published 0000“…This paper presents segmented addressable scan (SAS), a test architecture that addresses test data volume, test application time, test power consumption, and tester channel requirements using a hardware overhead of a few gates per scan chain. …”
Get full text
Get full text
article -
72
Information Warfare
Published 2015Get full text
Get full text
Get full text
Get full text
conferenceObject -
73
Shuffled Linear Regression with Erroneous Observations
Published 2019Get full text
Get full text
Get full text
Get full text
conferenceObject -
74
On end-to-end scheduling in wireless cellular networks
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
76
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
77
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
78
Local convexity preserving rational cubic spline curves
Published 1997“…An algorithm is presented which constructs a curve by interpolating the given data points. …”
Get full text
Get full text
article -
79
-
80
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”