بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
-
41
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
42
-
43
-
44
-
45
-
46
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
47
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
منشور في 2021"…<p>This paper proposes a novel fault detection and diagnosis (FDD) technique for grid-tied PV systems. …"
-
48
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
منشور في 2024"…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
-
49
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
منشور في 2023"…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …"
-
50
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis -
51
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. It detects and simultaneously protects the IoMT network from further intrusion with only a 0.18% service interruption rate. …"
-
52
Deep and transfer learning for building occupancy detection: A review and comparative analysis
منشور في 2022"…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …"
-
53
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
منشور في 2024"…The proposed algorithm has successfully maintained homogeneity to the original data set, reduced the execution time and occupied storage space, and led to decent monitoring performance.…"
-
54
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
55
Correlation Clustering with Overlaps
منشور في 2020"…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
56
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
-
57
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
منشور في 2025"…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …"
-
58
Data Redundancy Management in Connected Environments
منشور في 2020"…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
59
-
60
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
منشور في 2020"…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
احصل على النص الكامل