يعرض 141 - 160 نتائج من 291 نتيجة بحث عن '(( implement based algorithm ) OR ((( second phase algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 141

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…Based on the performance metrics, such as confusion matrix, training time, prediction time, accuracy, and Area Under the Receiver Operating Characteristic curve (AUC-ROC), it was established that SDN-ML-IoT, when applied to RF, outperforms other ML algorithms, as well as similar approaches related to our work. …"
  2. 142
  3. 143

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  4. 144

    A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI حسب Oishi Jyoti (21593819)

    منشور في 2025
    "…After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …"
  5. 145

    Timing influenced general-cell genetic floorplanner حسب Sait, Sadiq M.

    منشور في 2020
    "…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 146

    Timing influenced general-cell genetic floorplanner حسب Sait, Sadiq M.

    منشور في 2020
    "…The floorplanner works in two phases. In the first phase we use the genetic algorithm and restrict the modules to be rigid and the floorplan to have slicing structure. …"
    احصل على النص الكامل
    article
  7. 147
  8. 148

    Three approaches to modelling heating and evaporation of monocomponent droplets حسب Dmitrii V. Antonov (21225041)

    منشور في 2024
    "…In the third approach, the same algorithm as in the second approach is used to calculate the heat rate but the mass evaporation rate in this approach is inferred from the coupled solution to the momentum, mass and energy conservation equations in the gas phase; the gas mixture density in this approach depends on temperature. …"
  9. 149

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 150

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …"
  11. 151

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 152

    Turbo-charging dominating set with an FPT subroutine حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 153
  14. 154
  15. 155

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
  16. 156
  17. 157
  18. 158
  19. 159

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring حسب Muzna Yumman (16494023)

    منشور في 2020
    "…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
  20. 160

    A pragmatic approach for testing robustness on real-time component based systems حسب Tarhini, Abbas

    منشور في 2005
    "…If all components are robust according to the inserted hazards, in the second phase, we use the nominal and degraded specification of the whole system to check the robustness of communications between components.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject