-
1
-
2
-
3
Advanced Technology in Agriculture Industry by Implementing Image Annotation Technique and Deep Learning Approach: A Review
Published 2022“…<p dir="ltr">The implementation of intelligent technology in agriculture is seriously investigated as a way to increase agriculture production while reducing the amount of human labor. …”
-
4
-
5
Unsupervised outlier detection in multidimensional data
Published 2022“…The newly proposed ideas are found efficient in terms of performance, ease of implementation, and computational complexity. Furthermore, two proposed techniques presented in this paper use transformation of data to a unidimensional distance space to detect the outliers, so irrespective of the data’s high dimensions, the techniques remain computationally inexpensive and feasible. …”
-
6
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. …”
Get full text
Get full text
article -
7
Audio-deepfake detection: Adversarial attacks and countermeasures
Published 2024“…To mitigate the effect of adversarial attacks on audio-deepfake detectors, we propose a highly generalizable, lightweight, simple, and effective add-on defense mechanism that can be implemented in any audio-deepfake detector. Finally, we discuss promising research directions.…”
-
8
-
9
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. …”
Get full text
article -
10
The outcomes of implementing clinical guidelines to manage pediatric diabetic ketoacidosis in emergency department
Published 2025“…A repeated-measure ANOVA was used to detect the difference between outcome measures during the follow-up period. …”
-
11
Lightweight intrusion detection for mobile devices. (c2012)
Published 2012Get full text
Get full text
masterThesis -
12
-
13
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…However, unsupervised data mining techniques are reliable in detecting fraud before they happen. For the research, I found out the importance of data mining in detecting fraud in procurement. …”
Get full text
-
14
Detection of statistically significant network changes in complex biological networks
Published 2017“…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…”
-
15
-
16
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
Published 2023“…The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. …”
-
17
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…In addition, there is a large amount of data to analyze and the detection is required in real time to be useful. It is therefore necessary to have an effective mechanism to detect malware and attacks on the network. …”
Get full text
-
18
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
19
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
20