بدائل البحث:
system implementation » its implementation (توسيع البحث)
يعرض 1 - 20 نتائج من 113 نتيجة بحث عن '(( python (programme OR programs) implementation ) OR ( detection system implementation ))*', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Estimating the reliability of the inspection system employed for detecting defects in rail track using ultrasonic guided waves حسب Khalil, Abdelgalil

    منشور في 2022
    "…This work focuses on the implementation of a data-based method to determine the inspection system reliability in terms of detecting different types of damages in rail track specimens using ultrasonic guided Rayleigh waves and a probability of detection (POD) technique. …"
    احصل على النص الكامل
  6. 6
  7. 7

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array حسب Amran Hossain (570706)

    منشور في 2022
    "…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. The imaging results demonstrated that the implemented MBI system can successfully detect the target benign and malignant tumors with their locations inside the brain.…"
  8. 8

    An IoT Assisted Real-Time High CMRR Wireless Ambulatory ECG Monitoring System with Arrhythmia Detection حسب Hassan Ali (3348749)

    منشور في 2021
    "…To tackle this problem, in this paper, the development of an Internet of things (IoT) assisted ambulatory electrocardiogram (ECG) monitoring system is presented. The system’s wearable single-channel data acquisition device supports 25 h of continuous operation. …"
  9. 9

    Simulation study of a coincidence detection system for non-invasive determination of arterial blood time-activity curve measurements حسب Yassine Toufique (8252550)

    منشور في 2020
    "…Addition of extra axial detection rings to the half-ring configuration provided increases in system sensitivity by a factor of approximately 10.…"
  10. 10

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…They are willing to invest their money in fraud detection and control systems that will curb fraud. …"
    احصل على النص الكامل
  11. 11
  12. 12

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones حسب Syeda Nazia Ashraf (17541222)

    منشور في 2023
    "…The research underscores the significance of establishing a secure and fortified drone network to mitigate interception and intrusion risks. The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. …"
  13. 13

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis of network traffic. …"
    احصل على النص الكامل
  14. 14
  15. 15

    Plant Disease Classifier: Detection of Dual-Crop Diseases Using Lightweight 2D CNN Architecture حسب Hasibul Islam Peyal (17983828)

    منشور في 2023
    "…The purpose of this work is to categorize 14 classes for both cotton and tomato crops, with 12 diseased classes and two healthy classes using a deep learning-based lightweight 2D CNN architecture and to implement the model in an android application named “Plant Disease Classifier” for smartphone-assisted plant disease diagnosis system, the results of the experiments reveal that the proposed model outperforms the pre-trained models VGG16, VGG19 and InceptionV3 despite having fewer parameters. …"
  16. 16

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring حسب Aya Nabil Sayed (17317006)

    منشور في 2024
    "…Leveraging the capabilities of this open-source home automation platform, we have developed a sophisticated system for providing real-time <u>energy consumption data</u>, personalized energy-saving recommendations, and a data-driven occupancy detection mechanism. …"
  17. 17

    A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems حسب Mariam Elnour (14147790)

    منشور في 2023
    "…This work presents a distributed, machine learning based attack detection and mitigation framework for sensor false data injection cyber-physical attacks in industrial control systems. …"
  18. 18
  19. 19

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…In this context, this paper presents an improved framework (SDN-ML-IoT) that works as an Intrusion and Prevention Detection System (IDPS) that could help to detect DDoS attacks with more efficiency and mitigate them in real time. …"
  20. 20

    Audio-deepfake detection: Adversarial attacks and countermeasures حسب Mouna Rabhi (17086969)

    منشور في 2024
    "…<p>Audio has always been a powerful resource for biometric authentication: thus, numerous AI-based audio authentication systems (classifiers) have been proposed. While these classifiers are effective in identifying legitimate human-generated input their security, to the best of our knowledge, has not been explored thoroughly when confronted with advanced attacks that leverage AI-generated deepfake audio. …"