Search alternatives:
using detection » change detection (Expand Search), island detection (Expand Search)
based function » taste function (Expand Search)
Showing 1 - 20 results of 452 for search '(( algorithm based function ) OR ( algorithm using detection ))', query time: 0.10s Refine Results
  1. 1

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. …”
    Get full text
    Get full text
  2. 2
  3. 3

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  4. 4

    Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation by Abualigah, Laith

    Published 2023
    “…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …”
    Get full text
  5. 5
  6. 6
  7. 7

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…This work proved the feasibility of using machine learning in detecting malware and improving the security of mobile devices. …”
    Get full text
    article
  8. 8
  9. 9
  10. 10

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm by Prabu Selvam (22330264)

    Published 2025
    “…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
  11. 11
  12. 12
  13. 13

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
    Get full text
    Get full text
    article
  14. 14
  15. 15

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  16. 16
  17. 17
  18. 18

    AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques by Khalid, Naji

    Published 2023
    “…The results of this study demonstrated the effectiveness of the proposed defect detection and localization algorithm as it managed to read all barcodes, localize defective columns, and binary classify the condition of the concrete covers against their surrounding objects. …”
    Get full text
    Get full text
    Get full text
    article
  19. 19

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem by Abu Zitar, Raed

    Published 2023
    “…The measurements and track generation are simulated using Stone Soup software. On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …”
    Get full text
  20. 20