Search alternatives:
method identification » model identification (Expand Search), its identification (Expand Search), type identification (Expand Search)
identification method » identification based (Expand Search), classification method (Expand Search)
learning method » learning methods (Expand Search)
method identification » model identification (Expand Search), its identification (Expand Search), type identification (Expand Search)
identification method » identification based (Expand Search), classification method (Expand Search)
learning method » learning methods (Expand Search)
-
1
-
2
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The application of these research findings finds relevance in user identification for insider investigation, e-commerce, and e-learning system as well as in network planning and management. …”
-
3
A New Forensic Video Database for Source Smartphone Identification: Description and Analysis
Published 2022Subjects: -
4
Email Spam: A Comprehensive Review of Optimize Detection Methods, Challenges, and Open Research Problems
Published 2024“…These limitations have led to the advancement of more sophisticated machine learning (ML) and deep learning (DL) methods for enhanced spam detection accuracy. …”
-
5
-
6
-
7
-
8
Vehicular Environment Identification Based on Channel State Information and Deep Learning
Published 2022“…This paper presents a novel vehicular environment identification approach based on deep learning. It consists of exploiting the vehicular wireless channel characteristics in the form of Channel State Information (CSI) in the receiver side of a connected vehicle in order to identify the environment type in which the vehicle is driving, without any need to implement specific sensors such as cameras or radars. …”
Get full text
-
9
Biometric Identification Based on Eye Movement and Iris Features Using Task-Driven and Task-Independent Stimuli
Published 2013Get full text
doctoralThesis -
10
Deep learning and vision transformers-based framework for breast cancer and subtype identification
Published 2025“…This study utilizes a deep learning framework for advanced, automatic breast cancer detection and subtype identification. …”
-
11
-
12
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
13
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
Published 2013Get full text
doctoralThesis -
14
Hierarchical deep learning approach using fusion layer for Source Camera Model Identification based on video taken by smartphone
Published 2023“…This work exploits these two categories of methods by exploring a hierarchical deep learning model for camera model identification based on smartphone videos. …”
Get full text
Get full text
Get full text
article -
15
A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout
Published 2025“…This paper presents a dual-path deep learning framework for the detection and identification of HTs via side-channel analysis. …”
-
16
Hierarchical deep learning approach using fusion layer for Source Camera Model Identification based on video taken by smartphone
Published 2024“…This work exploits these two categories of methods by exploring a hierarchical deep learning model for camera model identification based on smartphone videos. …”
-
17
Using Agile Methods to Navigate Complex Publisher Open Access Workflows: The Case of the Qatar National Library Open Access Fund
Published 2022“…</p><p dir="ltr">This presentation describes how the OA fund team adopted methods and tools from agile project management to improve workplace and external communication and workflows to address the higher demand for the service. …”
-
18
-
19
-
20
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. The proposed method can be considered secure and reliable for any kind of biometric identification and authentication.…”