بدائل البحث:
data detection » data injection (توسيع البحث)
pass algorithm » jaya algorithm (توسيع البحث)
يعرض 21 - 40 نتائج من 492 نتيجة بحث عن '(( data detection algorithm ) OR ((( develop based algorithm ) OR ( elements pass algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 21

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
    احصل على النص الكامل
    احصل على النص الكامل
  2. 22
  3. 23

    Application of Red Deer Algorithm in Optimizing Complex functions حسب Zitar, Raed

    منشور في 2021
    "…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
  4. 24
  5. 25

    An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling حسب ALKETBI, SAIF

    منشور في 2016
    "…Several nonlinear optimization models were developed for this purpose assuming uniform resource availability and sequence based project tasks. …"
    احصل على النص الكامل
  6. 26

    Online Fuzzy Logic Base Algorithm for Electricity Price Prediction حسب Albayed, Moamin J.

    منشور في 2017
    "…The proposed algorithm was developed and hosted in a utility server (U-server). …"
    احصل على النص الكامل
    article
  7. 27
  8. 28

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System حسب Abualigah, Laith

    منشور في 2023
    "…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …"
    احصل على النص الكامل
  9. 29

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
  10. 30

    The buffered work-pool approach for search-tree based optimization algorithms حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…This new trend has been motivated by hardness of approximation results that appeared in the last decade, and has taken a great boost by the emergence of parameterized complexity theory. Exact algorithms often follow the classical search-tree based recursive backtracking strategy. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 31

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
    احصل على النص الكامل
    article
  12. 32
  13. 33
  14. 34

    VEGAWES: variational segmentation on whole exome sequencing for copy number detection حسب Samreen Anjum (19651882)

    منشور في 2015
    "…Recently, Whole Exome Sequencing is gaining popularity with copy number variations detection due to low cost and better efficiency. In this work, we developed VEGAWES for accurate and robust detection of copy number variations on WES data. …"
  15. 35
  16. 36

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …"
  17. 37

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  18. 38

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems حسب Boukhari, Bahia

    منشور في 2019
    "…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 39

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering حسب Abu Zitar, Raed

    منشور في 2022
    "…However, the traditional AOA faces some limitations in its search process. Thus, we develop a new variant of the AOA, namely, Augmented AOA (AAOA), integrated with the opposition-based learning (OLB) and Lévy flight (LF) distribution. …"
  20. 40

    Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges حسب Sk Injamamul Islam (14111241)

    منشور في 2024
    "…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …"