يعرض 1 - 15 نتائج من 15 نتيجة بحث عن '(( done detection algorithm ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2
  3. 3

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
    احصل على النص الكامل
  4. 4
  5. 5

    Four-dimensional representation and collision detection for movingobjects حسب Aliyu, M.D.S.

    منشور في 1998
    "…We consider the collision detection problem for general objects. A four-dimensional approach is proposed for this problem which detects exactly and in one-step when and where the earliest collision will occur between the objects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning حسب ALFALASI, FARIS Jr

    منشور في 2023
    "…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …"
    احصل على النص الكامل
  7. 7

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs حسب Tarsissi, Lama

    منشور في 2021
    "…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …"
    احصل على النص الكامل
  8. 8

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  9. 9
  10. 10

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach حسب Nagendra Prabhu Selvaraj (17542041)

    منشور في 2022
    "…Bots’ detection in the cloud environment is a complex process. …"
  11. 11
  12. 12

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  13. 13
  14. 14

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
  15. 15

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"