بدائل البحث:
based implementation » broader implementation (توسيع البحث), related implementation (توسيع البحث), system implementation (توسيع البحث)
python based » method based (توسيع البحث)
based implementation » broader implementation (توسيع البحث), related implementation (توسيع البحث), system implementation (توسيع البحث)
python based » method based (توسيع البحث)
-
1
A Novel Deep Learning Model for Detection of Severity Level of the Disease in Citrus Fruits
منشور في 2022"…The model demonstrates 96% accuracy in detecting healthy conditions and 97% accuracy in detecting medium severity levels. …"
-
2
Hybrid Model for Detection of Cervical Cancer Using Causal Analysis and Machine Learning Techniques
منشور في 2022"…This research work analyses cervical cancer and various risk factors to help detect cervical cancer. The proposed model Boruta with SVM and various popular ML models are implemented using Python and various performance measuring parameters, i.e., accuracy, precision, F 1 – Score , and recall. …"
-
3
Advanced Technology in Agriculture Industry by Implementing Image Annotation Technique and Deep Learning Approach: A Review
منشور في 2022"…<p dir="ltr">The implementation of intelligent technology in agriculture is seriously investigated as a way to increase agriculture production while reducing the amount of human labor. …"
-
4
-
5
-
6
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
منشور في 2023"…A MATLAB/Simulink-based simulation model of the process validated with actual data from a local plant is used. …"
-
7
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
8
Simulation study of a coincidence detection system for non-invasive determination of arterial blood time-activity curve measurements
منشور في 2020"…An alternative method is proposed in this work by the simulation of a non-invasive coincidence detection unit.</p><h3>Results</h3><p dir="ltr">We utilized GATE simulations of a human forearm phantom with a blood flow model, as well as a model for dynamic radioactive bolus activity concentration based on clinical measurements. …"
-
9
-
10
-
11
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
منشور في 2022"…Later, a nine-antenna array-based microwave brain imaging (MBI) system is implemented and investigated by using phantom model. …"
-
12
Self-DSNet: A Novel Self-ONNs Based Deep Learning Framework for Multimodal Driving Distraction Detection
منشور في 2025"…To address these challenges, we propose a novel model, Self-DSNet, for efficient driving distraction detection. …"
-
13
-
14
Audio-deepfake detection: Adversarial attacks and countermeasures
منشور في 2024"…., the Deep4SNet classification model, which achieves 98.5% accuracy in detecting fake audio samples. …"
-
15
-
16
Lightweight intrusion detection for mobile devices. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
17
Detection of statistically significant network changes in complex biological networks
منشور في 2017"…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…"
-
18
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
19
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
منشور في 2023"…Furthermore, the model's performance was evaluated using well-known drones’ CICIDS2017, and KDDCup 99 datasets. …"
-
20
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…In addition, it implies carrying out the training and testing process in each phase. Since the best model is obtained from training, each time it is performed for a given phase, the model is adjusted to detect new attacks. …"
احصل على النص الكامل