يعرض 41 - 60 نتائج من 288 نتيجة بحث عن '(( relevant based algorithm ) OR ((( detection using algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 41

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. …"
    احصل على النص الكامل
  2. 42
  3. 43
  4. 44
  5. 45

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  6. 46

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning حسب ALFALASI, FARIS Jr

    منشور في 2023
    "…Techniques for natural language processing may be used to text data to extract useful features like sentiment, emotion, and subjectivity. …"
    احصل على النص الكامل
  7. 47

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. …"
  8. 48

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …"
  9. 49
  10. 50

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  11. 51

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents حسب Muhammad E. H. Chowdhury (14150526)

    منشور في 2019
    "…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …"
  12. 52
  13. 53
  14. 54
  15. 55

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates حسب Elmahdy, Samy

    منشور في 2020
    "…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …"
    احصل على النص الكامل
    article
  16. 56

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier حسب JAIN, SWETA

    منشور في 2023
    "…By using the proposed approach, the accuracy of autism detection is improved to 99.83%.…"
    احصل على النص الكامل
    احصل على النص الكامل
  17. 57

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques حسب SALLOUM, SAID

    منشور في 2022
    "…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …"
    احصل على النص الكامل
    احصل على النص الكامل
  18. 58

    Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation حسب Abualigah, Laith

    منشور في 2023
    "…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …"
    احصل على النص الكامل
  19. 59

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine حسب Debendra Muduli (20748758)

    منشور في 2024
    "…In this MOD-POA+ELM algorithm, the modified pelican optimization algorithm (MOD-POA) has been utilized to optimize the parameters of ELM’s hidden neurons. …"
  20. 60

    Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice حسب Turker Tuncer (16677966)

    منشور في 2020
    "…Our approach is a simple and efficient voice-based algorithm in which a multi-center and multi threshold based ternary pattern is used (MCMTTP). …"