يعرض 21 - 40 نتائج من 67 نتيجة بحث عن '(( implement detection algorithm ) OR ((( element rd algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 21
  2. 22
  3. 23

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array حسب Amran Hossain (570706)

    منشور في 2022
    "…The imaging results demonstrated that the implemented MBI system can successfully detect the target benign and malignant tumors with their locations inside the brain.…"
  4. 24

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  5. 25

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios حسب Hasan Abbas Al-Mohammed (16810674)

    منشور في 2021
    "…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …"
  6. 26
  7. 27
  8. 28

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
  9. 29

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  10. 30

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring حسب Aya Nabil Sayed (17317006)

    منشور في 2024
    "…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36

    Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine حسب Majd A. AbuAlrob (22392505)

    منشور في 2025
    "…<p>Artificial intelligence (AI) is revolutionizing epilepsy care by advancing seizure detection, enhancing diagnostic precision, and enabling personalized treatment. …"
  17. 37

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 38

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 39

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
  20. 40

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …"