يعرض 161 - 180 نتائج من 986 نتيجة بحث عن '(( elements update algorithm ) OR ((( data processing algorithm ) OR ( system using algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 161
  2. 162
  3. 163

    Malicious URL and Intrusion Detection using Machine Learning حسب Hamza, Amr

    منشور في 2024
    "…Different ML algorithms were applied, namely Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). …"
    احصل على النص الكامل
    article
  4. 164
  5. 165
  6. 166
  7. 167

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 168
  9. 169

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control حسب Abu Zitar, Raed

    منشور في 2022
    "…The initial statistical and convergence profile assessment showed better performance of the proposed algorithm. The comparative analyses for transient and frequency responses were performed for the PID-controlled FES system using the original AOA, sine–cosine and particle swarm optimization algorithms and the traditional Ziegler-Nichols tuning scheme. …"
  10. 170
  11. 171

    A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services حسب Al-Qahtani, Salman

    منشور في 2005
    "…The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 172
  13. 173

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments حسب Mohammadhasan Faghihi (22303057)

    منشور في 2024
    "…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. …"
  14. 174
  15. 175
  16. 176

    Contingency analysis of bulk power system using neural networks حسب Maghrabi, H.

    منشور في 1998
    "…Radial basis function networks (RBFNs) are used for the contingency evaluation of bulk power systems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 177

    Optimal design of power system stabilizers using evolutionary programming حسب Abido, M.A.

    منشور في 2002
    "…The optimal design of power system stabilizers (PSSs) using evolutionary programming (EP) optimization technique is presented in this paper. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 178

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  19. 179

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure حسب Mouna Rabhi (17086969)

    منشور في 2024
    "…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. …"
  20. 180