بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
يعرض 121 - 140 نتائج من 447 نتيجة بحث عن '(( elementary rd algorithm ) OR ((( based detection algorithm ) OR ( data processing algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 121
  2. 122
  3. 123
  4. 124

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
  5. 125
  6. 126
  7. 127

    Bee Colony Algorithm for Proctors Assignment. حسب Mansour, Nashat

    منشور في 2015
    "…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 128
  9. 129

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 130

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  11. 131

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …"
  12. 132
  13. 133

    Process Mining over Unordered Event Streams حسب Awad, Ahmed

    منشور في 2020
    "…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  14. 134
  15. 135

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
    احصل على النص الكامل
  16. 136
  17. 137

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  18. 138

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  19. 139

    Spider monkey optimizations: application review and results حسب Abualigah, Laith

    منشور في 2024
    "…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …"
    احصل على النص الكامل
  20. 140

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis حسب Hurmat Ali Shah (18192889)

    منشور في 2024
    "…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …"