Showing 121 - 140 results of 242 for search '(( relevant deer algorithm ) OR ((( detection using algorithm ) OR ( neural coding algorithm ))))', query time: 0.12s Refine Results
  1. 121
  2. 122
  3. 123

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  4. 124

    Using Social Network Analysis to Study Business Partnerships by KARIM, ROLA RASHAD ARIF ABDUL

    Published 2018
    “…The resulting weighted undirected network is analysed using community detection algorithms. Characteristics of the top seven communities discovered from the 2015 data are discussed for which common social network motifs are captured. …”
    Get full text
  5. 125
  6. 126
  7. 127
  8. 128
  9. 129

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…Our collected event-based dataset using CeleX imager and five public event-based datasets are used to prove this concept, and the testing metrics reflect how early the neural network (NN) detects an image before the full-frame image is captured. …”
  10. 130

    PSYCHOLOGICAL EMOTION RECOGNITION OF STUDENTS USING MACHINE LEARNING BASED CHATBOT by Khalil Assayed, Suha

    Published 2023
    “…In this paper, we propose a chatbot for detecting the students feeling by using machine-learning algorithms. …”
    Get full text
  11. 131

    PSYCHOLOGICAL EMOTION RECOGNITION OF STUDENTS USING MACHINE LEARNING BASED CHATBOT by Khalil Assayed, Suha

    Published 2023
    “…In this paper, we propose a chatbot for detecting the students feeling by using machine-learning algorithms. …”
    Get full text
    Get full text
  12. 132

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE by ULLAH, SAAD

    Published 2022
    “…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
    Get full text
  13. 133
  14. 134

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…On the other hand, a tremendous advancement has been noticed in the human face detection and recognition technology which mainly used to authenticate and identify person face from a group of people through detecting a unique feature of the face and ignore the background image then compare the outcomes with the registered faces in the database to identify the person. …”
    Get full text
  15. 135

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
  16. 136

    Joint distributed synchronization and positioning in UWB ad hoc networks using TOA by Denis, B.

    Published 2006
    “…More particularly, the realistic UWB ranging error models we use take into account UWB channel effects, as well as detection noises and relative clock drifts. …”
    Get full text
    Get full text
    Get full text
    article
  17. 137
  18. 138

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. …”
    Get full text
  19. 139
  20. 140

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …”