بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
element » elements (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
element » elements (توسيع البحث)
-
21
-
22
-
23
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
منشور في 2022"…The imaging results demonstrated that the implemented MBI system can successfully detect the target benign and malignant tumors with their locations inside the brain.…"
-
24
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
25
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
منشور في 2021"…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …"
-
26
-
27
-
28
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
منشور في 2023"…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
-
29
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
30
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
منشور في 2024"…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
-
31
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
منشور في 2013احصل على النص الكامل
doctoralThesis -
32
-
33
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
منشور في 2017احصل على النص الكامل
doctoralThesis -
34
-
35
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
منشور في 2014احصل على النص الكامل
doctoralThesis -
36
Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine
منشور في 2025"…<p>Artificial intelligence (AI) is revolutionizing epilepsy care by advancing seizure detection, enhancing diagnostic precision, and enabling personalized treatment. …"
-
37
Information warfare. (c2015)
منشور في 2015"…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
38
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
39
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
-
40
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …"