بدائل البحث:
change detection » drone detection (توسيع البحث)
يعرض 1 - 20 نتائج من 34 نتيجة بحث عن 'change detection algorithm', وقت الاستعلام: 0.07s تنقيح النتائج
  1. 1

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…It can happen that due to gene mutations, as for example when cancer progresses, the gene expression network undergoes some amount of localized re-wiring. The ability to detect statistical relevant changes in the interaction patterns induced by the progression of the disease can lead to the discovery of novel relevant signatures. …"
  2. 2

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates حسب Elmahdy, Samy

    منشور في 2020
    "…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. Maps of change detection were then imported into a GIS environment and spatially correlated against the spatiotemporal maps of groundwater level and groundwater quality. …"
    احصل على النص الكامل
    article
  3. 3
  4. 4

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
    احصل على النص الكامل
  5. 5

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  7. 7

    Thermal Change Index-Based Diabetic Foot Thermogram Image Classification Using Machine Learning Techniques حسب Amith Khandakar (14151981)

    منشور في 2022
    "…Plantar foot thermogram images acquired using an infrared camera have been shown to detect changes in temperature distribution associated with a higher risk of foot ulceration. …"
  8. 8
  9. 9

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
  10. 10

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
    احصل على النص الكامل
  11. 11

    Image Local Features Description Through Polynomial Approximation حسب Fawad - (17018015)

    منشور في 2019
    "…The rotation invariance is achieved by aligning the local patch around the Harris corner through the dominant orientation shift algorithm. Weighted threshold histogram equalization (WTHE) is employed to make the descriptor in-sensitive to illumination changes. …"
  12. 12

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…Over time, several drift detection approaches have been proposed. A prominent approach is adaptive windowing (ADWIN) which can detect changes in features data distribution without explicit feedback on the correctness of the prediction. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  13. 13

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  14. 14

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…However, traditional IDS often follows rule-based detection where the rules can be changed and exposed to the attacker and becomes weak over time. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…However, traditional IDS often follows rule-based detection where the rules can be changed and exposed to the attacker and becomes weak over time. …"
  16. 16

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17
  18. 18

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity حسب Abdullah Al Siam (22304047)

    منشور في 2025
    "…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …"
  19. 19

    Evolutionary support vector regression for monitoring Poisson profiles حسب Ali Yeganeh (16624998)

    منشور في 2023
    "…This paper aims to monitor Poisson profile monitoring problem in Phase II and develops a new robust control chart using support vector regression by incorporating some novel input features and evolutionary training algorithm. The new method is quicker in detecting out-of-control signals as compared to conventional statistical methods. …"
  20. 20