بدائل البحث:
functions » functional (توسيع البحث)
يعرض 1 - 20 نتائج من 254 نتيجة بحث عن 'data ((((junction OR function) OR functions) algorithm) OR (detection algorithm))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1

    New enumeration algorithm for regular boolean functions حسب Nasrallah, Walid F.

    منشور في 2018
    "…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 2

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…Several algorithms have been proposed in the literature for synthesis of multiple valued logic functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 3

    Second-order conic programming for data envelopment analysis models حسب Mourad, Nahia

    منشور في 2022
    "…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
    احصل على النص الكامل
    احصل على النص الكامل
  4. 4

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
    احصل على النص الكامل
    احصل على النص الكامل
  5. 5

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
  6. 6
  7. 7

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  9. 9

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…<p dir="ltr">In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …"
  10. 10

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …"
  11. 11

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
  12. 12

    Ensemble Deep Random Vector Functional Link Neural Network for Regression حسب Minghui Hu (2457952)

    منشور في 2022
    "…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …"
  13. 13

    Distributed dimension reduction algorithms for widely dispersed data حسب Abu-Khzam, F.N.

    منشور في 2002
    "…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 14

    A neural networks algorithm for data path synthesis حسب Harmanani, Haidar M.

    منشور في 2003
    "…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
    احصل على النص الكامل
    article
  16. 16
  17. 17

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers حسب Mansour, Nashat

    منشور في 1997
    "…We experimentally analyze some properties of simulated annealing algorithms (SA) and genetic algorithms (GA) for mapping data to multicomputers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  19. 19

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  20. 20