يعرض 1 - 14 نتائج من 14 نتيجة بحث عن 'done detection algorithm*', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2
  3. 3
  4. 4

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
    احصل على النص الكامل
  5. 5

    Four-dimensional representation and collision detection for movingobjects حسب Aliyu, M.D.S.

    منشور في 1998
    "…Simulation results on some example problems are given, and show that the algorithm is superior to those available in the literature…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning حسب ALFALASI, FARIS Jr

    منشور في 2023
    "…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …"
    احصل على النص الكامل
  7. 7

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  8. 8
  9. 9

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach حسب Nagendra Prabhu Selvaraj (17542041)

    منشور في 2022
    "…On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …"
  10. 10
  11. 11

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs حسب Tarsissi, Lama

    منشور في 2021
    "…The existence of this hypergraph makes us conjecture an extended generating algorithm for the sequences of Deza et al. to include a much wider class of unique 3-uniform hypergraphs. …"
    احصل على النص الكامل
  12. 12

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  13. 13

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"
  14. 14