بدائل البحث:
program implementation » programme implementation (توسيع البحث), broader implementation (توسيع البحث)
program implementation » programme implementation (توسيع البحث), broader implementation (توسيع البحث)
-
1
-
2
-
3
Advanced Technology in Agriculture Industry by Implementing Image Annotation Technique and Deep Learning Approach: A Review
منشور في 2022"…<p dir="ltr">The implementation of intelligent technology in agriculture is seriously investigated as a way to increase agriculture production while reducing the amount of human labor. …"
-
4
Chip Level Implementation of a Digital Radar System
منشور في 2015احصل على النص الكامل
doctoralThesis -
5
Unsupervised outlier detection in multidimensional data
منشور في 2022"…The newly proposed ideas are found efficient in terms of performance, ease of implementation, and computational complexity. Furthermore, two proposed techniques presented in this paper use transformation of data to a unidimensional distance space to detect the outliers, so irrespective of the data’s high dimensions, the techniques remain computationally inexpensive and feasible. …"
-
6
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
7
Audio-deepfake detection: Adversarial attacks and countermeasures
منشور في 2024"…To mitigate the effect of adversarial attacks on audio-deepfake detectors, we propose a highly generalizable, lightweight, simple, and effective add-on defense mechanism that can be implemented in any audio-deepfake detector. Finally, we discuss promising research directions.…"
-
8
-
9
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. …"
احصل على النص الكامل
article -
10
The outcomes of implementing clinical guidelines to manage pediatric diabetic ketoacidosis in emergency department
منشور في 2025"…A repeated-measure ANOVA was used to detect the difference between outcome measures during the follow-up period. …"
-
11
Lightweight intrusion detection for mobile devices. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
12
-
13
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…However, unsupervised data mining techniques are reliable in detecting fraud before they happen. For the research, I found out the importance of data mining in detecting fraud in procurement. …"
احصل على النص الكامل
-
14
Detection of statistically significant network changes in complex biological networks
منشور في 2017"…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…"
-
15
-
16
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
منشور في 2023"…The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. …"
-
17
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…In addition, there is a large amount of data to analyze and the detection is required in real time to be useful. It is therefore necessary to have an effective mechanism to detect malware and attacks on the network. …"
احصل على النص الكامل
-
18
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
19
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20