Search alternatives:
presented » present (Expand Search)
Showing 121 - 140 results of 159 for search 'five ((detection algorithm) OR (presented algorithm))', query time: 0.08s Refine Results
  1. 121
  2. 122

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis by Ghada Al-Hussain (18295426)

    Published 2022
    “…</p><h3>Methods</h3><p dir="ltr">An electronic search was conducted in 5 databases. Studies that examined the performance (accuracy, sensitivity, and specificity) of any ML algorithm in detecting pathological voice samples were included. …”
  3. 123
  4. 124
  5. 125
  6. 126

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations by Mueen Uddin (4903510)

    Published 2025
    “…This research paper explores GAI in enhancing cybersecurity by leveraging AI Models and algorithms. GAI can autonomously address common security issues, detect novel threats, and augment human intervention in critical security aspects. …”
  7. 127

    Pre-production movie rating prediction using machine learning. (c2017) by Gerges, Firas Abdallah

    Published 2017
    “…Machine learning has proven its effectiveness in building decision making models and recommender systems in various fields. In this work, we present several machine learning techniques (Support Vectors Machine, K-Nearest Neighbors, C5, Neural Networks and Case-Based Reasoning) along with a genetic algorithm to predict the success of a movie before its production using the IMDB rating as an indicator of the success. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 128

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…We compare our results to the machine learning algorithm C4.5, and we show that our approach out-beats it.…”
    Get full text
    Get full text
    Get full text
    article
  9. 129
  10. 130
  11. 131

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…Our collected event-based dataset using CeleX imager and five public event-based datasets are used to prove this concept, and the testing metrics reflect how early the neural network (NN) detects an image before the full-frame image is captured. …”
  12. 132
  13. 133

    Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography by Muhammad Ali Akbar (16875915)

    Published 2024
    “…The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …”
  14. 134

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 135
  16. 136
  17. 137

    Validating a new model for rapid multi-dimensional combined heat and air infiltration building energy simulation by Abi Shdid, Caesar

    Published 2015
    “…A new model for combined heat and air infiltration simulation is developed and presented. The model resulted in up to 91.6% improvement in relative accuracy over current algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 138

    Development of a cerebral aneurysm segmentation method to prevent sentinel hemorrhage by Yousra Regaya (17788964)

    Published 2023
    “…The proposed algorithm is tested on Three-Dimensional Rotational Angiography (3DRA) datasets; the average values of segmentation accuracy, DSC, FPR, FNR, specificity, and sensitivity, are found to be 99.72%, 93.52%, 0.07%, 5.23%, 94.77%, and 99.96%, respectively.…”
  19. 139

    Multigrid solvers in reconfigurable hardware by Haraty, Ramzi A.

    Published 2008
    “…Yet, most efforts fail in this respect due to many factors (time, resources) governed by software implementations. In this paper, we present a hardware implementation of the V-cycle Multigrid method for finding the solution of a 2D-Poisson equation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 140