Search alternatives:
done detection » drone detection (Expand Search), drones detection (Expand Search), ion detection (Expand Search)
done detection » drone detection (Expand Search), drones detection (Expand Search), ion detection (Expand Search)
-
1
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
2
-
3
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …”
Get full text
-
4
-
5
Four-dimensional representation and collision detection for movingobjects
Published 1998“…We consider the collision detection problem for general objects. A four-dimensional approach is proposed for this problem which detects exactly and in one-step when and where the earliest collision will occur between the objects. …”
Get full text
Get full text
article -
6
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
7
Properties of Unique Degree Sequences of 3-Uniform Hypergraphs
Published 2021“…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …”
Get full text
-
8
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
9
-
10
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
Published 2022“…Bots’ detection in the cloud environment is a complex process. …”
-
11
-
12
Optimizing ADWIN for Steady Streams
Published 2022“…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …”
Get full text
Get full text
Get full text
-
13
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
14
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”