Showing 1 - 20 results of 59 for search 'learning method identification method', query time: 0.08s Refine Results
  1. 1
  2. 2

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…The application of these research findings finds relevance in user identification for insider investigation, e-commerce, and e-learning system as well as in network planning and management. …”
  3. 3
  4. 4

    Email Spam: A Comprehensive Review of Optimize Detection Methods, Challenges, and Open Research Problems by Ekramul Haque Tusher (21324362)

    Published 2024
    “…These limitations have led to the advancement of more sophisticated machine learning (ML) and deep learning (DL) methods for enhanced spam detection accuracy. …”
  5. 5
  6. 6
  7. 7
  8. 8

    Vehicular Environment Identification Based on Channel State Information and Deep Learning by Hadid, Abdenour

    Published 2022
    “…This paper presents a novel vehicular environment identification approach based on deep learning. It consists of exploiting the vehicular wireless channel characteristics in the form of Channel State Information (CSI) in the receiver side of a connected vehicle in order to identify the environment type in which the vehicle is driving, without any need to implement specific sensors such as cameras or radars. …”
    Get full text
  9. 9
  10. 10

    Deep learning and vision transformers-based framework for breast cancer and subtype identification by Ishrat Jahan (5782163)

    Published 2025
    “…This study utilizes a deep learning framework for advanced, automatic breast cancer detection and subtype identification. …”
  11. 11
  12. 12
  13. 13
  14. 14

    Hierarchical deep learning approach using fusion layer for Source Camera Model Identification based on video taken by smartphone by Younes, Akbari

    Published 2023
    “…This work exploits these two categories of methods by exploring a hierarchical deep learning model for camera model identification based on smartphone videos. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout by Arash Golabi (21841484)

    Published 2025
    “…This paper presents a dual-path deep learning framework for the detection and identification of HTs via side-channel analysis. …”
  16. 16

    Hierarchical deep learning approach using fusion layer for Source Camera Model Identification based on video taken by smartphone by Younes Akbari (16303286)

    Published 2024
    “…This work exploits these two categories of methods by exploring a hierarchical deep learning model for camera model identification based on smartphone videos. …”
  17. 17

    Using Agile Methods to Navigate Complex Publisher Open Access Workflows: The Case of the Qatar National Library Open Access Fund by Alwaleed Alkhaja (13761787)

    Published 2022
    “…</p><p dir="ltr">This presentation describes how the OA fund team adopted methods and tools from agile project management to improve workplace and external communication and workflows to address the higher demand for the service. …”
  18. 18
  19. 19
  20. 20

    Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms by Arafat Rahman (8065562)

    Published 2021
    “…We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. The proposed method can be considered secure and reliable for any kind of biometric identification and authentication.…”