بدائل البحث:
using detection » change detection (توسيع البحث), island detection (توسيع البحث)
based function » taste function (توسيع البحث)
using detection » change detection (توسيع البحث), island detection (توسيع البحث)
based function » taste function (توسيع البحث)
-
1
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. …"
احصل على النص الكامل
احصل على النص الكامل
-
2
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021الموضوعات: احصل على النص الكامل
احصل على النص الكامل
-
3
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
-
4
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
منشور في 2023"…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …"
احصل على النص الكامل
-
5
-
6
-
7
Android Malware Detection Using Machine Learning
منشور في 2024"…This work proved the feasibility of using machine learning in detecting malware and improving the security of mobile devices. …"
احصل على النص الكامل
article -
8
-
9
-
10
YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm
منشور في 2025"…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …"
-
11
-
12
-
13
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
14
-
15
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
16
-
17
-
18
AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques
منشور في 2023"…The results of this study demonstrated the effectiveness of the proposed defect detection and localization algorithm as it managed to read all barcodes, localize defective columns, and binary classify the condition of the concrete covers against their surrounding objects. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
منشور في 2023"…The measurements and track generation are simulated using Stone Soup software. On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …"
احصل على النص الكامل
-
20