بدائل البحث:
data selection » data injection (توسيع البحث)
data detection » data injection (توسيع البحث)
يعرض 181 - 200 نتائج من 282 نتيجة بحث عن '(( data selection algorithm ) OR ( data detection algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 181

    A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network حسب KHAN, FIROZ

    منشور في 2020
    "…In the first phase, data preprocessing and feature selection technique is applied to the collected dataset. …"
    احصل على النص الكامل
  2. 182

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation حسب Abdul Rahman, Sawsan

    منشور في 2019
    "…Our approach combines the strengths of mobile crowdsensing, with the support of the mobile infrastructure, a multi-criteria algorithm for the participants' selection, and a deductive rule-based model for traffic condition estimation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 183

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …"
  4. 184

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review حسب Alaa Abd-alrazaq (17058018)

    منشور في 2022
    "…Two reviewers independently performed the study selection process. Three reviewers independently extracted data from the included studies. …"
  5. 185

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  6. 186

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…Over time, several drift detection approaches have been proposed. A prominent approach is adaptive windowing (ADWIN) which can detect changes in features data distribution without explicit feedback on the correctness of the prediction. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  7. 187

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass حسب Uzma Nawaz (21980708)

    منشور في 2025
    "…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
  8. 188

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review حسب Uzair Shah (15740699)

    منشور في 2022
    "…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …"
  9. 189

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 190

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 191
  12. 192

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  13. 193
  14. 194
  15. 195

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
    احصل على النص الكامل
    article
  16. 196

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 197

    Electric Vehicles Charging Station Load Forecasting Integration With Renewable Energy Using Novel Deep EfficientBiLSTMNet حسب Vineet Dhanawat (22361395)

    منشور في 2025
    "…A hybrid feature selection technique integrates the Boruta algorithm and SHAP (SHapley Additive exPlanations) values to ensure robust feature selection. …"
  18. 198

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 199
  20. 200

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis حسب Ghada Al-Hussain (18295426)

    منشور في 2022
    "…Two reviewers independently selected the studies, extracted data from the included studies, and assessed the risk of bias. …"