Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Ashraf Abu-Ein"'
Autor:
Tarik Abu-Ain, Siti Norul Huda Sheikh Abdullah, Khairuddin Omar, Ashraf Abu-Ein, Bilal Bataineh, Waleed Abu-Ain
Publikováno v:
Journal of ICT Research and Applications, Vol 7, Iss 2, Pp 164-175 (2014)
Text normalization is an important technique in document image analysis and recognition. It consists of many preprocessing stages, which include slope correction, text padding, skew correction, and straight the writing line. In this side, text normal
Externí odkaz:
https://doaj.org/article/005dc24c810b48f883a8c303c84fddcd
Publikováno v:
International Journal of Online and Biomedical Engineering (iJOE). 18:131-151
Retinopathy is an eye disease caused by diabetes, and early detection and treatment can potentially reduce the risk of blindness in diabetic retinopathy sufferers. Using retinal Fundus images, diabetic retinopathy can be diagnosed, recognized, and tr
Publikováno v:
International Journal on Electrical Engineering and Informatics. 13:530-545
Arabic Dialect Identification is the process of identifying the speaker’s dialect based on several features in the corresponding acoustic wave. In this research, machine learning models for detecting Arabic dialects from acoustic wave is proposed u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa09e115c4ef47b7ec69cd491c5194d3
https://doi.org/10.21203/rs.3.rs-1726491/v1
https://doi.org/10.21203/rs.3.rs-1726491/v1
Publikováno v:
Journal of Computer Science. 16:1648-1656
In this study the heartbeat sound signals were tackled by classifying them into heart disease categories such as normal, artifact, murmur and extrahals in an attempt for early detection of heart defects. Phonocardiogram (i.e., PCG) is used to obtain
Publikováno v:
International Journal of Computer Applications. 179:40-43
Publikováno v:
Computer Networks. 201:108591
Phishing is an online fraud that deceives visitors by impersonating a legitimate website to steal their confidential or personal information. This is a well-known form of cybercrime. With the aim of detecting phishing sites, several phishing site det
Publikováno v:
International Journal of High Performance Computing and Networking. 17:39
Publikováno v:
International Journal of High Performance Computing and Networking. 17:39
Publikováno v:
International Journal of Computer Science and Information Technology. 8:127-133