يعرض 341 - 359 نتائج من 359 نتيجة بحث عن '(( elements method algorithm ) OR ((( data would algorithm ) OR ( based solution algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 341

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 342

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks حسب Mohammed Almehdhar (22046597)

    منشور في 2024
    "…Additionally, we explore emerging technologies, such as Federated Learning (FL) and Transfer Learning, to enhance the robustness and adaptability of IDS solutions. Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.…"
  3. 343

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…Subsequently, state-of-the-art research that envisions the use of clustering-based machine learning and deep learning-based solutions for PGP is presented. …"
  4. 344

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations حسب Abbas, Nadine Fawaz

    منشور في 2017
    "…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 345

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort حسب Sergio Márquez-Sánchez (19437985)

    منشور في 2023
    "…This inherent lack of adaptability to occupants significantly hampers the effectiveness of energy-saving solutions. Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. …"
  6. 346

    Condenser capacity and hyperbolic perimeterImage 1 حسب Mohamed M.S., Nasser

    منشور في 2021
    "…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 347

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…"
  8. 348

    Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization حسب Yassine Himeur (14158821)

    منشور في 2023
    "…Although the increasing number of articles proposed to develop DTL- and DDA-based VSSs, a thorough review that summarizes and criticizes the state-of-the-art is still missing. …"
  9. 349

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  10. 350

    Predicting Android Malware Using Evolution Networks حسب Chahine, Joy

    منشور في 2025
    "…This issue requires the development of efficient solutions in order to keep up with the continuous evolution of malware. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 351

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  12. 352

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…However, a variety of exact solutions exists for idealized situations, which can be useful in obtaining order-of-magnitude estimates. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  13. 353

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 354
  15. 355

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 356

    PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning حسب Gabriele Oligeri (14151426)

    منشور في 2022
    "…In this paper, we investigate the effectiveness and main limitations of AI-based solutions to the physical-layer authentication of LEO satellites. …"
  17. 357

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring حسب Aya Nabil Sayed (17317006)

    منشور في 2024
    "…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
  18. 358
  19. 359