بدائل البحث:
encoding algorithm » cosine algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
element » elements (توسيع البحث)
يعرض 101 - 120 نتائج من 196 نتيجة بحث عن '(((( data detection algorithm ) OR ( data encoding algorithm ))) OR ( element network algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 101

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
  2. 102

    Large-scale annotation dataset for fetal head biometry in ultrasound images حسب Mahmood Alzubaidi (15740693)

    منشور في 2023
    "…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…"
  3. 103

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates حسب Elmahdy, Samy

    منشور في 2020
    "…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …"
    احصل على النص الكامل
    article
  4. 104
  5. 105

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
    احصل على النص الكامل
  6. 106

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …"
  7. 107

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  8. 108

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …"
  9. 109

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring حسب Aya Nabil Sayed (17317006)

    منشور في 2024
    "…The DT technology enabled the creation of accurate virtual representations of users' physical environment, facilitating the optimization of energy-intensive devices and systems. Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
  10. 110
  11. 111
  12. 112

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  13. 113

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations حسب Mueen Uddin (4903510)

    منشور في 2025
    "…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …"
  14. 114

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security حسب Muhammad Maaz (5600600)

    منشور في 2024
    "…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …"
  15. 115

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach حسب Aya Hasan Alkhereibi (17151070)

    منشور في 2021
    "…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …"
  16. 116

    Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar حسب Sankaran Rajendran (14152830)

    منشور في 2022
    "…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …"
  17. 117

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 118
  19. 119

    Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine حسب Majd A. AbuAlrob (22392505)

    منشور في 2025
    "…Ethical considerations, such as safeguarding patient privacy, ensuring data security, and mitigating algorithmic bias, underscore the importance of responsible AI integration. …"
  20. 120

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"