يعرض 1 - 20 نتائج من 36 نتيجة بحث عن '(( task detection algorithm ) OR ( mutant detection algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1
  2. 2

    Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks حسب Ioannis A. Tsalafoutas (14776939)

    منشور في 2025
    "…<h3>Purpose</h3><p dir="ltr">To evaluate image quality (IQ) of for‐processing (raw) and for‐presentation (clinical) radiography images, under different exposure conditions and digital image post‐processing algorithms, using a phantom that enables multiple detection tasks.…"
  3. 3

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …"
  4. 4

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …"
  5. 5
  6. 6

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 7

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  8. 8

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …"
  9. 9

    Creating and detecting fake reviews of online products حسب Joni Salminen (7434770)

    منشور في 2022
    "…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. We show that a machine classifier can accomplish this goal near-perfectly, whereas human raters exhibit significantly lower accuracy and agreement than the tested algorithms. …"
  10. 10

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  11. 11

    Plant disease detection using drones in precision agriculture حسب Ruben Chin (17725986)

    منشور في 2023
    "…To address this problem, a systematic literature review (SLR) on the use of drones for plant disease detection was undertaken and 38 primary studies were selected to answer research questions related to disease types, drone categories, stakeholders, machine learning tasks, data, techniques to support decision-making, agricultural product types and challenges. …"
  12. 12

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…When applied to detect the main differences between the networks of IDH-mutant and IDH-wild-type glioma tumors, it correctly selects sub-networks centered on important key regulators of these two different subtypes. …"
  13. 13

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  14. 14

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …"
  15. 15
  16. 16

    Pedestrian Lane Detection for Assistive Navigation of Vision-Impaired People: Survey and Experimental Evaluation حسب Yunjia Lei (19517725)

    منشور في 2022
    "…<h3>Abstract</h3><p dir="ltr">Pedestrian lane detection is a crucial task in assistive navigation for vision-impaired people. …"
  17. 17

    MSD-NAS: multi-scale dense neural architecture search for real-time pedestrian lane detection حسب Sui Paul Ang (18460605)

    منشور في 2023
    "…This paper proposes a novel neural architecture search (NAS) algorithm, named MSD-NAS, to automate this laborious task. …"
  18. 18

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine حسب Debendra Muduli (20748758)

    منشور في 2024
    "…Lastly, a newly improved learning algorithm encompasses a modified pelican optimization algorithm (MOD-POA) and an extreme learning machine (ELM) for classification tasks. …"
  19. 19
  20. 20

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios حسب Hasan Abbas Al-Mohammed (16810674)

    منشور في 2021
    "…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …"