بدائل البحث:
code encryption » secure encryption (توسيع البحث)
drone » prone (توسيع البحث)
يعرض 1 - 19 نتائج من 19 نتيجة بحث عن '(( (drone OR done) detection algorithm ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    Plant disease detection using drones in precision agriculture حسب Ruben Chin (17725986)

    منشور في 2023
    "…Nowadays, one of the most popular approaches for this automation is to use drones. Though there are several articles published on the use of drones for plant disease detection, a systematic overview of these studies is lacking. …"
  2. 2

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem حسب Abu Zitar, Raed

    منشور في 2023
    "…This paper presents efforts to solve the multi-track measurement assignment problem in drone detection and tracking. In many cases, several radars are collectively used to track drones efficiently, generating measurements and several tracks under different circumstances. …"
    احصل على النص الكامل
  3. 3

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization حسب Abu Zitar, Raed

    منشور في 2024
    "…This paper presents a novel hybrid optimization method to solve the resource allocation problem for multi-target multi-sensor tracking of drones. This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …"
    احصل على النص الكامل
  4. 4
  5. 5

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6
  7. 7

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
    احصل على النص الكامل
  8. 8
  9. 9

    Four-dimensional representation and collision detection for movingobjects حسب Aliyu, M.D.S.

    منشور في 1998
    "…We consider the collision detection problem for general objects. A four-dimensional approach is proposed for this problem which detects exactly and in one-step when and where the earliest collision will occur between the objects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 10

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning حسب ALFALASI, FARIS Jr

    منشور في 2023
    "…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …"
    احصل على النص الكامل
  11. 11

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs حسب Tarsissi, Lama

    منشور في 2021
    "…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …"
    احصل على النص الكامل
  12. 12

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  13. 13
  14. 14

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach حسب Nagendra Prabhu Selvaraj (17542041)

    منشور في 2022
    "…Bots’ detection in the cloud environment is a complex process. …"
  15. 15
  16. 16

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  17. 17
  18. 18

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
  19. 19

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"