يعرض 1 - 20 نتائج من 25 نتيجة بحث عن '(( code encryption algorithm ) OR ( wide detection algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1
  2. 2

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
  3. 3
  4. 4

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…Obtained results using 4000 synthetic writers of GPDS synthetic database show that the proposed handcrafted features have considerable ability to detect synthetic signatures vs. two widely used real individuals signatures databases, namely CEDAR and GPDS-300, which reach 98.67% and 94.05% of successful synthetic detection rates respectively.…"
    احصل على النص الكامل
  5. 5

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …"
    احصل على النص الكامل
  6. 6

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  7. 7

    NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY حسب JINESH, PADIKKAPPARAMBIL

    منشور في 2022
    "…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …"
    احصل على النص الكامل
  8. 8

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies حسب Jebbaoui, Hussein

    منشور في 2015
    "…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9
  10. 10
  11. 11

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review حسب Avneet Kaur (712349)

    منشور في 2024
    "…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
  12. 12

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems حسب Hisham A. Kholidy (18891802)

    منشور في 2019
    "…<p dir="ltr">The Cypher Physical Power Systems (CPPS) became vital targets for intruders because of the large volume of high speed heterogeneous data provided from the Wide Area Measurement Systems (WAMS). The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …"
  13. 13
  14. 14
  15. 15
  16. 16

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …"
  17. 17

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques حسب Joao Palotti (8479842)

    منشور في 2019
    "…We also implemented and compared state-of-the-art methods to score sleep-wake stages, which range from the widely used traditional algorithms to recent machine learning approaches. …"
  18. 18

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
  19. 19

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security حسب Muhammad Maaz (5600600)

    منشور في 2024
    "…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …"
  20. 20

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems حسب Jahanzaib Malik (23718816)

    منشور في 2025
    "…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. …"