يعرض 1 - 20 نتائج من 38 نتيجة بحث عن '(((( develop post algorithm ) OR ( element deer algorithm ))) OR ( data backing algorithm ))*', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
  4. 4

    A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology حسب Jaber, Mohammad

    منشور في 2020
    "…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 5

    A Survey and Comparison of Post-Quantum and Quantum Blockchains حسب Zebo Yang (18441096)

    منشور في 2023
    "…The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. …"
  6. 6

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  7. 7

    Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles حسب Zainab Akhtar (15192184)

    منشور في 2024
    "…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …"
  8. 8

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care حسب Barry Solaiman (19160614)

    منشور في 2024
    "…<p>This article proposes a framework for examining the ethical and legal concerns for using artificial intelligence (AI) in post-acute and long-term care (PA-LTC). It argues that established frameworks on health, AI, and the law should be adapted to specific care contexts. …"
  9. 9

    A hybrid graph representation for recursive backtracking algorithms حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 10
  11. 11
  12. 12

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms حسب Md Ferdous Wahid (13485799)

    منشور في 2022
    "…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …"
  13. 13

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  14. 14

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
  15. 15
  16. 16

    Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix حسب Haraty, Ramzi Ahmed

    منشور في 2017
    "…Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17
  18. 18

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…This paper reports on an innovative and comprehensive method proposed for the quality control of drilled shafts that overcomes several limitations of conventional methods. The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Neural network-based failure rate prediction for De Havilland Dash-8 tires حسب Al-Garni, Ahmed Z.

    منشور في 2006
    "…An artificial neural network (ANN) model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the twolayered feed-forward back-propagation algorithm as a learning rule is developed. …"
    احصل على النص الكامل
    article
  20. 20

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES حسب Al-Garni, Ahmed Z.

    منشور في 2020
    "…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …"
    احصل على النص الكامل
    article