Search alternatives:
second detection » drone detection (Expand Search), ion detection (Expand Search), island detection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
second detection » drone detection (Expand Search), ion detection (Expand Search), island detection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
1
-
2
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
3
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The first phase consists of an image processing-based method that extracts the Asymmetry, Border Irregularity, Color Variation and Diameter of a given mole. The second phase classifies lesions using a Genetic Algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
4
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
5
-
6
-
7
YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm
Published 2025“…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
-
8
-
9
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …”
Get full text
-
10
-
11
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
12
-
13
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
14
Parallel Algorithms for Distinguishing Nondeterministic Finite State Machines
Published 2015Get full text
doctoralThesis -
15
Malicious URL and Intrusion Detection using Machine Learning
Published 2024“…Using the second dataset, the DT classifier proved most suitable for intrusion detection, achieving an accuracy of 95%. …”
Get full text
article -
16
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
17
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
18
-
19
-
20
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis