يعرض 141 - 160 نتائج من 322 نتيجة بحث عن '(( present data algorithm ) OR ((( element processing algorithm ) OR ( relevant data algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 141
  2. 142

    Single channel speech denoising by DDPG reinforcement learning agent حسب Sania Gul (18272227)

    منشور في 2025
    "…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
  3. 143

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…However, high dimensional data present a significant challenge for machine learning techniques. …"
  4. 144

    Correlation Clustering with Overlaps حسب Fakhereldine, Amin

    منشور في 2020
    "…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 145
  6. 146
  7. 147

    Nested ensemble selection: An effective hybrid feature selection method حسب Kamalov, Firuz

    منشور في 2023
    "…It has been shown that while feature selection algorithms are able to distinguish between relevant and irrelevant features, they fail to differentiate between relevant and redundant and correlated features. …"
    احصل على النص الكامل
    article
  8. 148

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems حسب Ahmad K. Sleiti (14778229)

    منشور في 2022
    "…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …"
  9. 149

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 150
  11. 151
  12. 152
  13. 153

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
  14. 154

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …"
  15. 155
  16. 156
  17. 157
  18. 158

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
  19. 159

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory حسب Wehbi, Osama

    منشور في 2022
    "…Adopting a random selection strategy would entail substantial problems due to the heterogeneity in terms of data quality, and computational and communication resources across the participants. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 160

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…This paper presents a machine learning approach for Android malware detection. …"
    احصل على النص الكامل
    article