يعرض 1 - 20 نتائج من 74 نتيجة بحث عن '(( algorithm machine function ) OR ( algorithm ((hardening function) OR (python function)) ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1
  2. 2

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…The performance of three machine learning (ML) algorithms was assessed to predict the wild blueberry harvest losses on the ground. …"
  3. 3

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
    احصل على النص الكامل
    احصل على النص الكامل
  4. 4

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology حسب Senyuk, Mihail

    منشور في 2023
    "…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …"
    احصل على النص الكامل
    article
  6. 6
  7. 7

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9
  10. 10

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …"
    احصل على النص الكامل
    article
  11. 11
  12. 12
  13. 13

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm حسب Saima Hassan (14918003)

    منشور في 2022
    "…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …"
  14. 14

    Ensemble Deep Random Vector Functional Link Neural Network for Regression حسب Minghui Hu (2457952)

    منشور في 2022
    "…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …"
  15. 15

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…An intrusion detection system (IDS) is the most promising solution for preventing malicious intrusions and tracing suspicious network behavioral patterns. Machine learning (ML) methods are widely used in IDS. …"
  16. 16

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm حسب Ghulam Jillani Ansari (16896342)

    منشور في 2021
    "…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …"
  17. 17

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …"
  18. 18

    Iterative Least Squares Functional Networks Classifier حسب Faisal, Kanaan A

    منشور في 2007
    "…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19
  20. 20