بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
erf algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element erf » elementi per (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
erf algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element erf » elementi per (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
1
-
2
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
3
-
4
-
5
-
6
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
احصل على النص الكامل
-
7
-
8
Automatic Video Summarization Using HEVC and CNN Features
منشور في 2022احصل على النص الكامل
doctoralThesis -
9
-
10
Unsupervised outlier detection in multidimensional data
منشور في 2022"…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …"
-
11
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
12
-
13
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
منشور في 2010احصل على النص الكامل
doctoralThesis -
14
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
احصل على النص الكامل
article -
15
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
16
Detection of statistically significant network changes in complex biological networks
منشور في 2017"…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…"
-
17
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
منشور في 2023"…On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …"
احصل على النص الكامل
-
18
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
20
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
منشور في 2023"…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …"
احصل على النص الكامل