يعرض 1 - 20 نتائج من 23 نتيجة بحث عن '(( (node OR note) detection algorithm ) OR ( code encryption algorithm ))*', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    Accurate multiple network alignment through context-sensitive random walk حسب Hyundoo Jeong (3840013)

    منشور في 2015
    "…In this work, we propose a novel multiple network alignment algorithm based on a context-sensitive random walk model. …"
  4. 4
  5. 5

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12
  13. 13

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach حسب Nagendra Prabhu Selvaraj (17542041)

    منشور في 2022
    "…The performance of the proposed bot detection system in the internet environment is analyzed latency, detection rate, packet delivery ration, energy availability and precision.…"
  14. 14

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
    احصل على النص الكامل
  15. 15
  16. 16

    Joint distributed synchronization and positioning in UWB ad hoc networks using TOA حسب Denis, B.

    منشور في 2006
    "…On the one hand, the proposed synchronization scheme basically relies on cooperative two-way-ranging/time-of-arrival transactions and a diffusion algorithm that ensures the convergence of clock parameters to average reference values in each node. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17
  18. 18

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
  20. 20

    Using Social Network Analysis to Study Business Partnerships حسب KARIM, ROLA RASHAD ARIF ABDUL

    منشور في 2018
    "…The resulting weighted undirected network is analysed using community detection algorithms. Characteristics of the top seven communities discovered from the 2015 data are discussed for which common social network motifs are captured. …"
    احصل على النص الكامل