بدائل البحث:
protection algorithm » auction algorithm (توسيع البحث)
يعرض 41 - 60 نتائج من 181 نتيجة بحث عن 'data ((protection algorithm) OR (detection algorithm))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 41
  2. 42

    A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation حسب Khaled Dhibi (16891524)

    منشور في 2021
    "…<p>This paper proposes a novel fault detection and diagnosis (FDD) technique for grid-tied PV systems. …"
  3. 43

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review حسب Avneet Kaur (712349)

    منشور في 2024
    "…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
  4. 44

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …"
  5. 45
  6. 46

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture حسب Moutaz Alazab (17730060)

    منشور في 2025
    "…The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. It detects and simultaneously protects the IoMT network from further intrusion with only a 0.18% service interruption rate. …"
  7. 47

    Deep and transfer learning for building occupancy detection: A review and comparative analysis حسب Aya Nabil Sayed (17317006)

    منشور في 2022
    "…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …"
  8. 48

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…The proposed algorithm has successfully maintained homogeneity to the original data set, reduced the execution time and occupied storage space, and led to decent monitoring performance.…"
  9. 49

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …"
  10. 50

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …"
  11. 51

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 52
  13. 53

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... حسب Mohamed, AlShuweihi

    منشور في 2020
    "…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
    احصل على النص الكامل
  14. 54
  15. 55
  16. 56

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  17. 57

    Capturing outline of fonts using genetic algorithm and splines حسب Sarfraz, M.

    منشور في 2001
    "…We present a method to convert the original problem into a discrete combinatorial optimization problem and solve it by a genetic algorithm. We also incorporate a corner detection algorithm to detect significant points which are necessary to capture a pleasant looking spline fitting for shapes such as fonts. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 58

    GenDE: A CRF-Based Data Extractor حسب Kayed, Mohammed

    منشور في 2020
    "…Web site schema detection and data extraction from the Deep Web have been studied a lot. …"
    احصل على النص الكامل
    احصل على النص الكامل
  19. 59
  20. 60

    Data redundancy management for leaf-edges in connected environments حسب Mansour, Elio

    منشور في 2022
    "…DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article