Search alternatives:
presented » present (Expand Search)
Showing 101 - 120 results of 159 for search 'five ((presented algorithm) OR (detection algorithm))', query time: 0.09s Refine Results
  1. 101
  2. 102

    3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019) by Islambouli, Rania

    Published 2019
    “…Unmanned aerial vehicles (UAVs) have recently emerged as enablers for mul- titude use cases in 5G networks leading to interesting industrial and business applications. 5G networks envision a multi-service network promoting various applications with a distinct set of performance and service demands. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 103
  4. 104

    Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review by Yosra Magdi Mekki (21673721)

    Published 2025
    “…The majority of studies utilized deep learning approaches, particularly CNNs (<i>n</i> = 15), and some focused on radiomics features (<i>n</i> = 5) and traditional machine learning techniques.…”
  5. 105
  6. 106

    On Equivalent Circuit Model-Based State-of-Charge Estimation for Lithium-Ion Batteries in Electric Vehicles by Fatma Ahmed (11084787)

    Published 2025
    “…A third-order equivalent circuit model is employed for the LIB based on electrochemical impedance spectra test results, with model parameters identified using a particle swarm optimization algorithm. Two real-time model-based estimation algorithms, Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF), are compared for SoC estimation. …”
  7. 107

    Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism by Aisha Nasser J. M. Al-Saei (17885957)

    Published 2023
    “…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …”
  8. 108
  9. 109

    Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility by Islambouli, Rania

    Published 2019
    “…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 110
  11. 111
  12. 112

    An improved kernel for the undirected planar feedback vertex set problem by Abu-Khzam, Faisal N.

    Published 2017
    “…We consider the parameterized Feedback Vertex Set problem on unweighted, undirected planar graphs. We present a kernelization algorithm that takes a planar graph G and an integer k as input and either decides that (G,k) is a no instance or produces an equivalent (kernel) instance (G′,k′) such that k′ ≤ k and |V(G′)| < 97k. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 113

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 114

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 115

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks by Tamer Ahmed Eltaras (22565414)

    Published 2025
    “…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
  16. 116

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…In this study, we evaluate the performance of five machine learning techniques in characterizing five possible undesired interactions between a child and a social robot. …”
  17. 117
  18. 118

    Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids by Ahmed Ouammi (14151039)

    Published 2021
    “…<p>This paper presents a scheduling framework based algorithm for reducing/shaving the peak loads in a team of cooperating microgrids (TCM) powered smart buildings taking advantages of vehicle-to-building (V2B) concept and operational flexibilities of electric vehicles (EVs). …”
  19. 119
  20. 120

    Lung nodule classification utilizing support vector machines by Mousa, W.A.H.

    Published 2002
    “…The sensitivity of SVM classifier is found to be 87.5%. We intend to automate the pre-processing detection process to further enhance the overall classification.…”
    Get full text
    Get full text
    article