Search alternatives:
network diffusion » network intrusion (Expand Search)
network detection » news detection (Expand Search)
Showing 1 - 20 results of 121 for search '(( network diffusion algorithm ) OR ( network detection algorithm ))*', query time: 0.10s Refine Results
  1. 1

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …”
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…”
  7. 7
  8. 8

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm by Prabu Selvam (22330264)

    Published 2025
    “…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
  9. 9
  10. 10
  11. 11
  12. 12

    Fault detection and classification in hybrid energy-based multi-area grid-connected microgrid clusters using discrete wavelet transform with deep neural networks by S. N. V. Bramareswara Rao (21768302)

    Published 2024
    “…With this intent, this work proposes a “Discrete Wavelet Transform with Deep Neural Network (DWT-DNN)” for detecting and classifying the various faults that occurred in hybrid energy-based multi-area grid-connected microgrid clusters. …”
  13. 13

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
    Get full text
    Get full text
  14. 14

    A machine learning model for early detection of diabetic foot using thermogram images by Amith Khandakar (14151981)

    Published 2021
    “…A comparison of the inference time for the best-performing networks confirmed that the proposed algorithm can be deployed as a smartphone application to allow the user to monitor the progression of the DFU in a home setting.…”
  15. 15

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  16. 16
  17. 17

    Joint distributed synchronization and positioning in UWB ad hoc networks using TOA by Denis, B.

    Published 2006
    “…Print Request Permissions In this paper, we describe a global distributed solution that enables the simultaneous performance of time synchronization and positioning in ultra-wideband (UWB) ad hoc networks. On the one hand, the proposed synchronization scheme basically relies on cooperative two-way-ranging/time-of-arrival transactions and a diffusion algorithm that ensures the convergence of clock parameters to average reference values in each node. …”
    Get full text
    Get full text
    Get full text
    article
  18. 18

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. …”
  19. 19

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  20. 20