Search alternatives:
programs implementation » programme implementation (Expand Search)
Showing 1 - 20 results of 186 for search '(( python programs implementation ) OR ( detection _ implementation ))*', query time: 0.09s Refine Results
  1. 1
  2. 2
  3. 3

    Advanced Technology in Agriculture Industry by Implementing Image Annotation Technique and Deep Learning Approach: A Review by Normaisharah Mamat (19517623)

    Published 2022
    “…<p dir="ltr">The implementation of intelligent technology in agriculture is seriously investigated as a way to increase agriculture production while reducing the amount of human labor. …”
  4. 4
  5. 5

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…The newly proposed ideas are found efficient in terms of performance, ease of implementation, and computational complexity. Furthermore, two proposed techniques presented in this paper use transformation of data to a unidimensional distance space to detect the outliers, so irrespective of the data’s high dimensions, the techniques remain computationally inexpensive and feasible. …”
  6. 6

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. …”
    Get full text
    Get full text
    article
  7. 7

    Audio-deepfake detection: Adversarial attacks and countermeasures by Mouna Rabhi (17086969)

    Published 2024
    “…To mitigate the effect of adversarial attacks on audio-deepfake detectors, we propose a highly generalizable, lightweight, simple, and effective add-on defense mechanism that can be implemented in any audio-deepfake detector. Finally, we discuss promising research directions.…”
  8. 8
  9. 9

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. …”
    Get full text
    article
  10. 10

    The outcomes of implementing clinical guidelines to manage pediatric diabetic ketoacidosis in emergency department by Majdi Younis (20625920)

    Published 2025
    “…A repeated-measure ANOVA was used to detect the difference between outcome measures during the follow-up period. …”
  11. 11
  12. 12
  13. 13

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…However, unsupervised data mining techniques are reliable in detecting fraud before they happen. For the research, I found out the importance of data mining in detecting fraud in procurement. …”
    Get full text
  14. 14

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…”
  15. 15
  16. 16

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones by Syeda Nazia Ashraf (17541222)

    Published 2023
    “…The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. …”
  17. 17

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…In addition, there is a large amount of data to analyze and the detection is required in real time to be useful. It is therefore necessary to have an effective mechanism to detect malware and attacks on the network. …”
    Get full text
  18. 18

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  19. 19

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
    Get full text
    Get full text
    Get full text
    article
  20. 20