Search alternatives:
second detection » drone detection (Expand Search), ion detection (Expand Search), island detection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
second detection » drone detection (Expand Search), ion detection (Expand Search), island detection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
1
-
2
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The first phase consists of an image processing-based method that extracts the Asymmetry, Border Irregularity, Color Variation and Diameter of a given mole. The second phase classifies lesions using a Genetic Algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
3
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
4
-
5
-
6
YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm
Published 2025“…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
-
7
-
8
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …”
Get full text
-
9
-
10
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
11
-
12
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
13
Malicious URL and Intrusion Detection using Machine Learning
Published 2024“…Using the second dataset, the DT classifier proved most suitable for intrusion detection, achieving an accuracy of 95%. …”
Get full text
article -
14
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
15
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
16
-
17
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
18
YOLO-SAIL: Attention-Enhanced YOLOv5 With Optimized Bi-FPN for Ship Target Detection in SAR Images
Published 2025“…It has recently become increasingly popular to apply deep learning algorithms to the identification of ships in SAR images. …”
-
19
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …”
Get full text
-
20
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…OSF is tolerated by changing the switching function based on the location of the fault. Second, the voltage and current sensor fault is detected when the DT provides a specific amplitude of currents while the physical sensors do not provide a correct measurement. …”