Showing 141 - 160 results of 526 for search 'a ((selection algorithm) OR (detection algorithm))', query time: 0.11s Refine Results
  1. 141

    Four-dimensional representation and collision detection forpolytopic objects by Aliyu, M.D.S.

    Published 1998
    “…An algorithm for detecting the collision of moving objects is presented. …”
    Get full text
    Get full text
    article
  2. 142

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce VHDRA, a Vertical and Horizontal Data Reduction Approach, to improve the classification accuracy and speed of the NNGE algorithm and reduce the computational resource consumption. …”
  3. 143

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Traditional skin cancer diagnosis methods are costly, require a professional physician, and take time. Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  4. 144

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…The proposed scheme for handover prediction outperforms traditional methods i.e. received signal strength method and traveling distance method by reducing the number of unnecessary handovers by 60% and 50% respectively. Similarly, in AP selection, the proposed scheme outperforms the strongest signal first and least loaded first algorithms by achieving higher throughput gains up to 9.2% and 8% respectively.…”
  5. 145
  6. 146

    Computer-aided detection of Melanoma using geometric features by Azar, Danielle

    Published 2017
    “…In this work, we investigate the use of geometric features to differentiate between a benign lesion and a malignant one. The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 147
  8. 148

    Malicious URL and Intrusion Detection using Machine Learning by Hamza, Amr

    Published 2024
    “…Therefore, addressing the growing threat of cyberattacks and providing automated solutions became a necessity. The purpose of this paper is to use machine learning (ML) techniques for malicious websites detection and classification, and intrusion detection. …”
    Get full text
    article
  9. 149

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Consequently, I have designed and built a new Arabic text repository, the largest available, that can serve me and others in investigating various classifiers to deal with the issue of detecting cyberbullying. …”
    Get full text
  10. 150
  11. 151
  12. 152

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems by Abdel Magid, Y.L.

    Published 2020
    “…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. …”
    Get full text
    article
  13. 153

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  14. 154

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
  15. 155

    Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs by Kouatli, Issam

    Published 2008
    “…Purpose – This paper seeks to identify and propose a standard approach for the selection and optimization of fuzzy sets used in fuzzy decision‐making systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 156

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  17. 157
  18. 158

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems by Boukhari, Bahia

    Published 2019
    “…Since the adaptation of the most advanced security paradigm does not guarantee a full protection. Also, it is possible that the attack is not directly detected. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 159

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…This work aims to enhance the performance of the K-means algorithm by introducing a novel method for selecting the initial centroids, thereby minimizing randomness and reducing the number of iterations needed to reach optimal results. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 160

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
    Get full text