بدائل البحث:
programs implementation » programme implementation (توسيع البحث)
يعرض 1 - 20 نتائج من 186 نتيجة بحث عن '(( python programs implementation ) OR ( detection implementation _ ))*', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    Advanced Technology in Agriculture Industry by Implementing Image Annotation Technique and Deep Learning Approach: A Review حسب Normaisharah Mamat (19517623)

    منشور في 2022
    "…<p dir="ltr">The implementation of intelligent technology in agriculture is seriously investigated as a way to increase agriculture production while reducing the amount of human labor. …"
  4. 4
  5. 5

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…The newly proposed ideas are found efficient in terms of performance, ease of implementation, and computational complexity. Furthermore, two proposed techniques presented in this paper use transformation of data to a unidimensional distance space to detect the outliers, so irrespective of the data’s high dimensions, the techniques remain computationally inexpensive and feasible. …"
  6. 6

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 7

    Audio-deepfake detection: Adversarial attacks and countermeasures حسب Mouna Rabhi (17086969)

    منشور في 2024
    "…To mitigate the effect of adversarial attacks on audio-deepfake detectors, we propose a highly generalizable, lightweight, simple, and effective add-on defense mechanism that can be implemented in any audio-deepfake detector. Finally, we discuss promising research directions.…"
  8. 8
  9. 9

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. …"
    احصل على النص الكامل
    article
  10. 10

    The outcomes of implementing clinical guidelines to manage pediatric diabetic ketoacidosis in emergency department حسب Majdi Younis (20625920)

    منشور في 2025
    "…A repeated-measure ANOVA was used to detect the difference between outcome measures during the follow-up period. …"
  11. 11
  12. 12
  13. 13

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…However, unsupervised data mining techniques are reliable in detecting fraud before they happen. For the research, I found out the importance of data mining in detecting fraud in procurement. …"
    احصل على النص الكامل
  14. 14

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…"
  15. 15
  16. 16

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones حسب Syeda Nazia Ashraf (17541222)

    منشور في 2023
    "…The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. …"
  17. 17

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…In addition, there is a large amount of data to analyze and the detection is required in real time to be useful. It is therefore necessary to have an effective mechanism to detect malware and attacks on the network. …"
    احصل على النص الكامل
  18. 18

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  19. 19

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies حسب Jebbaoui, Hussein

    منشور في 2015
    "…Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20