Search alternatives:
junction » functions (Expand Search)
Showing 1 - 20 results of 254 for search 'data (((function OR junction) algorithm) OR (detection algorithm))', query time: 0.11s Refine Results
  1. 1

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
    Get full text
    Get full text
  2. 2

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 3

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm by Ayman Khallel Al-Ani (17541447)

    Published 2023
    “…<p dir="ltr">In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
  4. 4

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …”
  5. 5

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  6. 6

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Several algorithms have been proposed in the literature for synthesis of multiple valued logic functions. …”
    Get full text
    Get full text
    article
  7. 7

    Distributed dimension reduction algorithms for widely dispersed data by Abu-Khzam, F.N.

    Published 2002
    “…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
    Get full text
    Get full text
    Get full text
    article
  9. 9

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  10. 10

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers by Mansour, Nashat

    Published 1997
    “…We experimentally analyze some properties of simulated annealing algorithms (SA) and genetic algorithms (GA) for mapping data to multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  11. 11

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  12. 12

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  13. 13

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  14. 14
  15. 15

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…Gamma pulses from a 3" Na(TI) scintillation detector were captured as single and double pulses for the purpose of testing the peak detection algorithms. The pulse classification technique was tested successfully on a TMS320C6000 high performance floating-point processor yielding a reduction of the execution time to 2 msec…”
    Get full text
    Get full text
    article
  16. 16

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 17
  18. 18

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text
  19. 19
  20. 20