1,602 skills found · Page 34 of 54
CMU-SAFARI / Molecules2VariationsThe first work to provide a comprehensive survey of a prominent set of algorithmic improvement and hardware acceleration efforts for the entire genome analysis pipeline used for the three most prominent sequencing data, short reads (Illumina), ultra-long reads (ONT), and accurate long reads (HiFi). Described in arXiv (2022) by Alser et al. https://arxiv.org/abs/2205.07957
pratikgirigoswami / Exemplar Based Image Inpainting• Image inpainting is the process of seamlessly filling in holes of arbitrary topology in an image to preserve its overall continuity. It is an ancient art of fixing accidental damage and recreating lost information. • Object removal or modification in the original images can be carried out through image inpainting methods. • In this project, various algorithms of Partial Derivative Equation based and Exemplar-based families have been studied and implemented. Results using Total Variation (TV) and Curvature Driven Diffusion (CDD) methods show that CDD produces a better visual quality of results. However, it fails to restore texture information. • To solve this problem, Exemplar-based algorithms are studied and implemented. Traditionally, the data term present in this algorithm is based on the strength of the isophote found using the gradient. The problem with the gradient operator is studied, and a better contour preserving data term is proposed. The proposed data term uses the strength of structure line found using Infinite size Symmetric Exponential Filter (ISEF). This filter helps overcome the drawback of which overcomes the drawback of insensibility to noise and precision of edge localization present in traditional data term. • Results are compared by quantitative analysis using PSNR, SSIM, and FSIM. Subjective analysis is done using Mean Opinion Score. It is proved that the proposed method produces better visual results compared to few other existing exemplar-based methods. • Methods/Keywords: Exemplar-based Image Inpainting, PDE-based Image Inpainting, ISEF Filter, Priority Computation, Isophote, Curvature Driven Diffusion • Software/Tools/Programming Language Used: MATLAB, C
mboukabous / Security Intelligence On Exchanged Multimedia Messages Based On Deep LearningDeep learning (DL) approaches use various processing layers to learn hierarchical representations of data. Recently, many methods and designs of natural language processing (NLP) models have shown significant development, especially in text mining and analysis. For learning vector-space representations of text, there are famous models like Word2vec, GloVe, and fastText. In fact, NLP took a big step forward when BERT and recently GTP-3 came out. Deep Learning algorithms are unable to deal with textual data in their natural language data form which is typically unstructured information; they require special representation of data as inputs instead. Usually, natural language text data needs to be converted into internal representations form that DL algorithms can read such as feature vectors, hence the necessity to use representation learning models. These models have shown a big leap during the last years. Their set ranges from the methods that embed words into distributed representations and use the language modeling objective to adjust them as model parameters (like Word2vec, fastText, and GloVe), to recently transfer learning models (like ELMo, BERT, ULMFiT, XLNet, ALBERT, RoBERTa, and GPT-2). These last use larger corpora, more parameters, more computing resources, and instead of assigning each word with a fixed vector, they use multilayer neural networks to calculate dynamic representations for the words according to their context, which is especially useful for the words with multiple meanings.
metemaad / HURDAT2 Processor# Best Track Data (HURDAT2) Atlantic hurricane database (HURDAT2) 1851-2018 (5.9MB download) This dataset was provided on 10 May 2019 to include the 2018 update to the best tracks. This dataset (known as Atlantic HURDAT2) has a comma-delimited, text format with six-hourly information on the location, maximum winds, central pressure, and (beginning in 2004) size of all known tropical cyclones and subtropical cyclones. The original HURDAT database has been retired. Detailed information regarding the Atlantic Hurricane Database Re-analysis Project is available from the Hurricane Research Division. ref:https://www.nhc.noaa.gov/data/ #https://www.nhc.noaa.gov/data/hurdat/hurdat2-format-atlantic.pdf # HURDAT2 Processor This is a python script that convert your HURDAT to a dataframe and generate a CSV file for you to eaily process this data. This work is part of trajectory segmentation research[1]. We use this dataset for evaluation purposes. If you are going to apply this script please cite to our work. Thanks. [1]: Etemad, Mohammad, et al. "A Trajectory Segmentation Algorithm Based on Interpolation-based Change Detection Strategies." EDBT/ICDT Workshops. 2019.
jstjyoti / Smart India Hackathon Team DigIndia Smart India Hackathon 2018 Identification of meritorious students in primary education Problem Statement:- Gujarat government has nearly 90 lac students studying in primary education across state. They are in different cities and villages across state. There is no mechanism to identify bright students who are performing well in study, sports or other activities. Web portal can be designed to acquire date about such students and can be analyzed on different parameters. What Exact Problem is being solved? : Such identified students can be provided with extra resources or special attention can be given to their upbringing. Abstract To identify meritorious students firstly all the educational institutions need to upload the results of students as well as points of extra curriculum activity (activity name, score out of 10 for performance) to the database for a student according to the current class of study. Aadhar number for all the students will always be given (from there students details will be verified).A parent or any other nongovernment institute can also upload scanned copy of result or certificate of any student with his/her Aadhar number and their own details. Admin will Cross-check and verify it for the update in the database. One’s (schools and institutions) first login or registration, there will be a unique token, (user id and password) to the Portal. That login will be further verified. So every institution will have a unique user id and password and students' details will be uploaded yearly and updates will be done twice in a year. The second fold of the solution is to sort the data according to the merit of students. The designed application will perform the operation with the provided data and present a lesser (according to requirement) students' details. There should be some methods (a faster and optimal Algorithm to sort data by marks and activity score from database Base will be adopted i.e., any tree type-level representation) to sort the data (details) of meritorious students from provided records of all the students. The third and final part is providing the list of meritorious students to the education department and university. Each official and university will also have a login section. The list of meritorious students will be provided according to year, required field. The education department or university can also post the facilities provided to the selected and shortlisted student as a notice. Therefore, we are going to solve the stated problem by providing a Web-based application comprising of Web portal and secured database to identify meritorious students in primary education according to data (100%) uploaded and retrieved from several institutions and selected meritorious students list will be provided to (according to specification of different facilities 20-30%) to Education Department and Universities. Keywords: Aadhar Number as Primary key of Student Table. Online WEB-portal. Update Records every year to keep a check on the improvement, Standardization & Soring data based on Z – stat to filter out the meritorious students on the basis of acads and extra-curricular activities. Tree type-level representation of Database i.e. Admin – Institute – Student. Use Case :- Choice Based selection of meritorious student from data set. For instances if the requirement is only limited to academics, they can refer to the website to fetch a list of top scorers say top 100 or top 200 students. Again if the requirement is limited to selection of Extra-curricular activity like – singing, painting, dancing etc they can fetch the list of students having expertise in that particular field only. Identification of poor meritorious students and Funding based support from different NGO’s, organizations and donations if they want to provide. Supervising data based on entries done in every year (Region based) to keep a check on the individual growth of a student. For instances, a diligent student say X has been receiving scholarship every year now say that X student’s data has not been registered in Database in the next year. Thus there is a decay of GDP in the sample space. To highlight the social issues such as Child Labour, child trafficking, by year wise regulation Data. To prevent the girl child marriage on the basis of Dataset by the investigation Team. For instance if a girl found not registering in the consecutive Year, an investigation team can take action accordingly. Special Features: The school should submit their data to get a recognition as well as to be in sight of fund providing parties (governmental or non-governmental). Students will be benefited as direct communication is in between officials and student and no middle man in between. • Data analysis will be the key point to identification using assignment of z-marks by standard normal distribution. Technology Stack: We are to make a Web-based app, in a microlithic structure format, where the app structure is broken into different fragments, which does the different job. One part will be taking in the to the database from a web portal designed using CSS, JavaScript, PHP, and Servlet. Computation of the sorted data and the various mathematical calculations i.e. arranging the sorted data according to given criteria etc on a mathematical platform powered by JAVA. Another part will be integrated with the API's of various Education Department and Universities to provide them up with shortlisted meritorious students, integrating with their personal choices and cut-offs, and also where shortlisted students will be notified by notice posted. Keeping in mind the ease of obtaining marks and details which has increased throughout the years. In the web app, after one's first login or registration, each part of the education department, university and institution have a unique token, (user id and password) to the database. Coming to the part of its database, My SQL or Oracle or Mongo DB can be used with a firmed dashboard powered by python or JavaScript on a network frame. Since the app will be containing huge academic details of many students, so a strong encryption algorithm is to be used for data integrity and data security. AES-256 or MD5 would be best to use to protect the data in the database and for authentication Biometric data will also be preserved.
The-Semicolons / AnalysisofRubiksCubeSolvingAlgorithmExploring the solution of a Rubik's Cube, a 3D combination puzzle invented by Ernő Rubik in 1974. This project analyzes most famous solving algorithms like Thistlethwaite's, Kociemba's, Korf's, and Tomas Rokicki's based on time & space complexities.
agouge / Java Network AnalyzerGraph theory and social network analysis algorithms implemented on JGraphT graphs.
Spikhalskiy / Algo2 2012 001Algorithms: Design and Analysis, Part 2 Programming Assignments
actigraph / Sleep Wake ClassificationAnalysis code for sleep-wake algorithm comparison
Amitdeb008 / IIT CS535 Design And Analysis Of AlgorithmIIT CS 535. Design and Analysis of Algorithm. All Assignment Solution , and all the course material . Illinois Institute of technology https://science.iit.edu/courses/cs535
stephenhky / GraphFlowAlgorithms for Graph Flow Analysis
sorrachai / FAA2025This is the repository for the course "Formalizing Analysis of Algorithms", Autumn 2025.
daviddmc / Numerical Analysis Toolboxbasic numerical analysis algorithms implemented in MATLAB for coursework
ElitsaY / Design And Analysis Of Algorithms PracticumNo description available
AdamStefan / DataMiningDataMining Algorithms. (C4.5 classification, Naive Bayes, RandomForest) A sentiment analysis implementation.
OpenWeavers / OpenanalysisAn implementation-neutral algorithm analysis and visualization library
komalswami / Data Structures And AlgorithmsDesign and Analysis of Algorithm
frontend website for https://youtube.tracking.exposed, the video platform algorithm analysis toolkit
sivertba / HSI DATA PROCESSING TOOLBOX MATLABA Repo collection of the algorithms described in the appendix of Chein-I Chang's book: Hyperspectral Data Processing: Algorithm Design and Analysis
apoorvam / Smart SensorAnalysis of various HR/BR estimation algorithms from accelerometer data