Search alternatives:
include » includes (Expand Search), included (Expand Search)
Showing 1 - 20 results of 71 for search 'include localization techniques', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    A Survey of Indoor Localization Systems for Multi-Floor Environments by Sherif Mostafa (13548916)

    Published 2025
    “…We then categorize and analyze the key challenges unique to multi-floor localization, including both input-level and system-level challenges. …”
  7. 7
  8. 8

    Diabetic Foot Ulcer Detection: Combining Deep Learning Models for Improved Localization by Rusab Sarmun (17632269)

    Published 2024
    “…We propose a comprehensive deep learning-based system for detecting DFUs from patients’ feet images by reliably localizing ulcer points. Our method utilizes innovative model ensemble techniques—non-maximum suppression (NMS), Soft-NMS, and weighted bounding box fusion (WBF)—to combine predictions from state-of-the-art object detection models. …”
  9. 9
  10. 10

    Review of techniques, challenges, and gaps in the subsurface gas release knowledge base by Ola Srour (17346841)

    Published 2024
    “…Additionally, this review touches upon practical and conceptual topics, such as detection and localization techniques, and flow regimes in other gaseous flows through soil and powder beds, putting into question the applicability of some presumed granulated concepts to the flowing behavior expected beyond migration. …”
  11. 11
  12. 12
  13. 13
  14. 14

    Platelet‐rich plasma intra‐articular knee injections from open preparation techniques do not pose a higher risk of joint infection: A systematic review of 91 randomized controlled... by Mohammad Sami Alazzeh (19730056)

    Published 2024
    “…Forty‐one implemented a closed technique, while 50 were open. All studies implementing a closed technique disclosed their commercial kits. …”
  15. 15

    Complications and side effects of Wide-Awake Local Anaesthesia No Tourniquet (WALANT) in upper limb surgery: a systematic review and meta-analysis by Jad Lawand (21633647)

    Published 2024
    “…<h3>Purpose</h3><p dir="ltr">Wide-Awake Local Anaesthesia No Tourniquet (WALANT), a groundbreaking anaesthetic technique resurging in practice, warrants a comprehensive safety analysis for informed adoption. …”
  16. 16

    Mining Student Information System Records to Predict Students’ Academic Performance by ABU SAA, AMJED TARIQ MOHAMMAD

    Published 2018
    “…The main aim of this study is to identify the most commonly studied factors that affect the students’ performance, as well as, the most common data mining techniques applied to identify these factors. Accordingly, this dissertation generated a dataset from a student information system from a local university in the United Arab Emirates. …”
    Get full text
  17. 17
  18. 18

    Differing endometrial expression of calcium modulating transient receptor potential channels by Maryam Ghavideldarestani (11862563)

    Published 2021
    “…Epithelial cell calcium homeostasis is tightly regulated by mechanisms that include activation of the TRP channel superfamily of 9 families including TRPC (Canonical) [1]. …”
  19. 19

    Unifying optimization forces: Harnessing the fine-structure constant in an electromagnetic-gravity optimization framework by Md. Amir Khusru Akhtar (22155568)

    Published 2024
    “…Future research opportunities include exploring adaptive mechanisms, hybrid approaches, handling high-dimensional problems, and integrating machine learning techniques to enhance its capabilities further. …”
  20. 20

    LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis by Saeif Alhazbi (17058108)

    Published 2025
    “…We develop a Deep Learning (DL) pipeline to capture these timing patterns using network traffic analysis and evaluate it on 16 Small Language Models (SLMs) and 10 proprietary LLMs across different deployment scenarios, including local host machine (GPU/CPU), Local Area Network (LAN), Remote Network, and when using Virtual Private Network (VPN). …”