بدائل البحث:
network diffusion » network intrusion (توسيع البحث)
network detection » news detection (توسيع البحث)
يعرض 1 - 20 نتائج من 121 نتيجة بحث عن '(( network diffusion algorithm ) OR ( network detection algorithm ))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …"
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…"
  7. 7
  8. 8

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm حسب Prabu Selvam (22330264)

    منشور في 2025
    "…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …"
  9. 9
  10. 10
  11. 11
  12. 12

    Fault detection and classification in hybrid energy-based multi-area grid-connected microgrid clusters using discrete wavelet transform with deep neural networks حسب S. N. V. Bramareswara Rao (21768302)

    منشور في 2024
    "…With this intent, this work proposes a “Discrete Wavelet Transform with Deep Neural Network (DWT-DNN)” for detecting and classifying the various faults that occurred in hybrid energy-based multi-area grid-connected microgrid clusters. …"
  13. 13

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
    احصل على النص الكامل
    احصل على النص الكامل
  14. 14

    A machine learning model for early detection of diabetic foot using thermogram images حسب Amith Khandakar (14151981)

    منشور في 2021
    "…A comparison of the inference time for the best-performing networks confirmed that the proposed algorithm can be deployed as a smartphone application to allow the user to monitor the progression of the DFU in a home setting.…"
  15. 15

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  16. 16
  17. 17

    Joint distributed synchronization and positioning in UWB ad hoc networks using TOA حسب Denis, B.

    منشور في 2006
    "…Print Request Permissions In this paper, we describe a global distributed solution that enables the simultaneous performance of time synchronization and positioning in ultra-wideband (UWB) ad hoc networks. On the one hand, the proposed synchronization scheme basically relies on cooperative two-way-ranging/time-of-arrival transactions and a diffusion algorithm that ensures the convergence of clock parameters to average reference values in each node. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT حسب Harun Surej Ilango (17545728)

    منشور في 2022
    "…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. …"
  19. 19

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  20. 20