Search alternatives:
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
61
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…We, therefore, Propose in this paper, a handcrafted feature based Writer-Independent (WI) signature verification system to detect synthetic writers and signatures through handcrafted features. …”
Get full text
-
62
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…In this context, this paper presents an improved framework (SDN-ML-IoT) that works as an Intrusion and Prevention Detection System (IDPS) that could help to detect DDoS attacks with more efficiency and mitigate them in real time. …”
-
63
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
Published 2017Get full text
doctoralThesis -
64
-
65
-
66
-
67
Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice
Published 2020“…The identification of an algorithm that discriminates between pathological and healthy voices with more accuracy is needed to obtain a smart and precise mobile health system. …”
-
68
-
69
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
-
70
-
71
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
-
72
Detection of statistically significant network changes in complex biological networks
Published 2017“…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
73
-
74
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
Published 2022“…Further, back-off features are extracted from the particular node and all these structures are trained and categorized with a Co-Active Neuro Fuzzy Expert System (CANFES) classifier. The performance of the proposed bot detection system in the internet environment is analyzed latency, detection rate, packet delivery ration, energy availability and precision.…”
-
75
Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques
Published 2025“…The generated IMF components are then fed into the Random Forest (RF) algorithm designed for shading detection and classification. …”
-
76
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
-
77
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
78
-
79
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…These findings emphasize the potential for deep learning techniques to be applied in the development of automated systems for identifying and combating cyberbullying on social media and show how well they work in detecting cyberbullying.…”
Get full text
-
80
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject