بدائل البحث:
code encryption » secure encryption (توسيع البحث)
prone » prove (توسيع البحث), pone (توسيع البحث)
code encryption » secure encryption (توسيع البحث)
prone » prove (توسيع البحث), pone (توسيع البحث)
-
1
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
منشور في 2018"…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
2
-
3
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
احصل على النص الكامل
-
4
-
5
Four-dimensional representation and collision detection for movingobjects
منشور في 1998"…We consider the collision detection problem for general objects. A four-dimensional approach is proposed for this problem which detects exactly and in one-step when and where the earliest collision will occur between the objects. …"
احصل على النص الكامل
احصل على النص الكامل
article -
6
Evolutionary algorithms for state justification in sequential automatic test pattern generation
منشور في 2005"…State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
احصل على النص الكامل
article -
7
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
منشور في 2023"…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …"
احصل على النص الكامل
-
8
Properties of Unique Degree Sequences of 3-Uniform Hypergraphs
منشور في 2021"…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …"
احصل على النص الكامل
-
9
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
10
-
11
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
منشور في 2022"…Bots’ detection in the cloud environment is a complex process. …"
-
12
-
13
Optimizing ADWIN for Steady Streams
منشور في 2022"…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
14
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
منشور في 2023"…However, manual CT scan analysis is time-consuming and prone to errors/not accurate. Considering these shortcomings, computational methods especially machine learning and deep learning algorithms are leveraged as an alternative to accelerate the accurate detection of CT scans as cancerous, and non-cancerous. …"
-
15
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
احصل على النص الكامل
article -
16
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
احصل على النص الكامل
احصل على النص الكامل
article -
17
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
18
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
-
19
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
منشور في 2024"…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"