يعرض 61 - 80 نتائج من 149 نتيجة بحث عن '(( model detection algorithms ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 61

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks حسب Yassine Himeur (14158821)

    منشور في 2022
    "…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. …"
  2. 62
  3. 63

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks حسب Mohammed Almehdhar (22046597)

    منشور في 2024
    "…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …"
  4. 64

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 65

    MSD-NAS: multi-scale dense neural architecture search for real-time pedestrian lane detection حسب Sui Paul Ang (18460605)

    منشور في 2023
    "…However, they lack practicality for real-time pedestrian lane detection due to non-optimal accuracy, speed, and model size trade-off. …"
  6. 66

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine حسب Debendra Muduli (20748758)

    منشور في 2024
    "…For mass fundus image-based glaucoma classification, an improved automated computer-aided diagnosis (CAD) model performing binary classification (glaucoma or healthy), allowing ophthalmologists to detect glaucoma disease correctly in less computational time. …"
  7. 67

    Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice حسب Turker Tuncer (16677966)

    منشور في 2020
    "…Smart health systems can be an easy and fast support to voice pathology detection. The identification of an algorithm that discriminates between pathological and healthy voices with more accuracy is needed to obtain a smart and precise mobile health system. …"
  8. 68
  9. 69

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  10. 70

    YOLO-SAIL: Attention-Enhanced YOLOv5 With Optimized Bi-FPN for Ship Target Detection in SAR Images حسب Prabu Selvam (22330264)

    منشور في 2025
    "…The proposed model, YOLO-SAIL, achieves an F1-score of 98.22% in SSDD datasets and 94.68% in HRSID datasets, outperforming most existing models.…"
  11. 71

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review حسب Hiba Alzoubi (18001609)

    منشور في 2025
    "…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …"
  12. 72

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …"
  13. 73

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  14. 74

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE حسب Ben Romdhane, Haifa

    منشور في 2023
    "…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …"
    احصل على النص الكامل
  15. 75

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE حسب Ben-Romdhane, Haïfa

    منشور في 2023
    "…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …"
    احصل على النص الكامل
    article
  16. 76
  17. 77

    On the Optimization of Band Gaps in Periodic Waveguides حسب Jamil Renno (14070771)

    منشور في 2025
    "…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …"
  18. 78

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 79
  20. 80