بدائل البحث:
perception algorithm » auction algorithm (توسيع البحث)
function algorithm » auction algorithm (توسيع البحث)
يعرض 1 - 20 نتائج من 51 نتيجة بحث عن 'users ((((perception algorithm) OR (function algorithm))) OR (detection algorithm))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…The final classification decision for both models is estimated by incorporating the node's past behavior with the machine learning algorithm. Any detected attack reduces the trustworthiness of the nodes involved, leading to a dynamic system cleansing. …"
  5. 5

    A machine learning model for early detection of diabetic foot using thermogram images حسب Amith Khandakar (14151981)

    منشور في 2021
    "…A comparison of the inference time for the best-performing networks confirmed that the proposed algorithm can be deployed as a smartphone application to allow the user to monitor the progression of the DFU in a home setting.…"
  6. 6
  7. 7

    Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility حسب Islambouli, Rania

    منشور في 2019
    "…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8
  9. 9
  10. 10

    Malicious URL and Intrusion Detection using Machine Learning حسب Hamza, Amr

    منشور في 2024
    "…Experimental results demonstrated that the ML algorithms were able to achieve high accuracy in predicting website maliciousness and intrusion detection. …"
    احصل على النص الكامل
    article
  11. 11

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers حسب Mansour, Nashat

    منشور في 1997
    "…Some user parameters are included in the objective function and are architecture- or problem-dependent parameters. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12
  13. 13
  14. 14

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives حسب Yassine Himeur (14158821)

    منشور في 2021
    "…If leveraged properly, that data could assist end-users, energy producers and utility companies in detecting anomalous power consumption and understanding the causes of each anomaly. …"
  16. 16
  17. 17

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. …"
  18. 18

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks حسب Yassine Himeur (14158821)

    منشور في 2022
    "…The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. Besides micro-moment features extraction, we also experiment with a deep neural network architecture for efficient abnormality detection and classification. …"
  19. 19

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  20. 20

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"