يعرض 61 - 80 نتائج من 149 نتيجة بحث عن '(( model detection algorithm ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 61

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 62

    MSD-NAS: multi-scale dense neural architecture search for real-time pedestrian lane detection حسب Sui Paul Ang (18460605)

    منشور في 2023
    "…However, they lack practicality for real-time pedestrian lane detection due to non-optimal accuracy, speed, and model size trade-off. …"
  3. 63

    Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice حسب Turker Tuncer (16677966)

    منشور في 2020
    "…Smart health systems can be an easy and fast support to voice pathology detection. The identification of an algorithm that discriminates between pathological and healthy voices with more accuracy is needed to obtain a smart and precise mobile health system. …"
  4. 64

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks حسب Yassine Himeur (14158821)

    منشور في 2022
    "…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. …"
  5. 65
  6. 66
  7. 67

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks حسب Mohammed Almehdhar (22046597)

    منشور في 2024
    "…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …"
  8. 68

    YOLO-SAIL: Attention-Enhanced YOLOv5 With Optimized Bi-FPN for Ship Target Detection in SAR Images حسب Prabu Selvam (22330264)

    منشور في 2025
    "…The proposed model, YOLO-SAIL, achieves an F1-score of 98.22% in SSDD datasets and 94.68% in HRSID datasets, outperforming most existing models.…"
  9. 69

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  10. 70

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review حسب Hiba Alzoubi (18001609)

    منشور في 2025
    "…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …"
  11. 71

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  12. 72

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …"
  13. 73
  14. 74

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization حسب Abu Zitar, Raed

    منشور في 2024
    "…The Extended Kalman Filter (EKF) is used for state estimation with proper clutter and detection models. Since we use Multi-objects to track, the Joint Probability Distribution Function (JPDA) estimates the best measurement values with a preset gating threshold. …"
    احصل على النص الكامل
  15. 75

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE حسب Ben Romdhane, Haifa

    منشور في 2023
    "…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …"
    احصل على النص الكامل
  16. 76

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE حسب Ben-Romdhane, Haïfa

    منشور في 2023
    "…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …"
    احصل على النص الكامل
    article
  17. 77

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 78
  19. 79
  20. 80