يعرض 1 - 20 نتائج من 76 نتيجة بحث عن 'multiple data protection algorithm', وقت الاستعلام: 0.24s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    A sample of original dataset. حسب Tamer Abdel Latif Ali (21464041)

    منشور في 2025
    "…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …"
  6. 6

    Attributes classification based on MSD. حسب Tamer Abdel Latif Ali (21464041)

    منشور في 2025
    "…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …"
  7. 7

    Privacy-preserving techniques evaluation. حسب Tamer Abdel Latif Ali (21464041)

    منشور في 2025
    "…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …"
  8. 8

    A sample of the dataset after applying MSD. حسب Tamer Abdel Latif Ali (21464041)

    منشور في 2025
    "…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …"
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    SupplimentaryCompressed (zipped) Folder. حسب Shravani Sanyal (20833595)

    منشور في 2025
    "…The pest identity was confirmed with morphological taxonomy, and the possible habitat distribution and further spread in future climate scenarios were modelled using the MaxEnt algorithm. The climate niche for <i>S. incertulas</i> was also established by analyzing the correlation between the pest occurrence data of 143 locations in India and seven bioclimatic variables <i>viz</i>., bio01, bio02, bio03, bio05, bio12, bio13, and bio15, were chosen for predicting the distribution of <i>S. incertulas</i>. …"
  14. 14

    Test omission rate and predicted area. حسب Shravani Sanyal (20833595)

    منشور في 2025
    "…The pest identity was confirmed with morphological taxonomy, and the possible habitat distribution and further spread in future climate scenarios were modelled using the MaxEnt algorithm. The climate niche for <i>S. incertulas</i> was also established by analyzing the correlation between the pest occurrence data of 143 locations in India and seven bioclimatic variables <i>viz</i>., bio01, bio02, bio03, bio05, bio12, bio13, and bio15, were chosen for predicting the distribution of <i>S. incertulas</i>. …"
  15. 15

    Bioclimatic variables used for the study. حسب Shravani Sanyal (20833595)

    منشور في 2025
    "…The pest identity was confirmed with morphological taxonomy, and the possible habitat distribution and further spread in future climate scenarios were modelled using the MaxEnt algorithm. The climate niche for <i>S. incertulas</i> was also established by analyzing the correlation between the pest occurrence data of 143 locations in India and seven bioclimatic variables <i>viz</i>., bio01, bio02, bio03, bio05, bio12, bio13, and bio15, were chosen for predicting the distribution of <i>S. incertulas</i>. …"
  16. 16

    Occurrence records of <i>S. incertulas</i> in the world. حسب Shravani Sanyal (20833595)

    منشور في 2025
    "…The pest identity was confirmed with morphological taxonomy, and the possible habitat distribution and further spread in future climate scenarios were modelled using the MaxEnt algorithm. The climate niche for <i>S. incertulas</i> was also established by analyzing the correlation between the pest occurrence data of 143 locations in India and seven bioclimatic variables <i>viz</i>., bio01, bio02, bio03, bio05, bio12, bio13, and bio15, were chosen for predicting the distribution of <i>S. incertulas</i>. …"
  17. 17

    Users data points. حسب Alon Sela (12231559)

    منشور في 2025
    "…Their methods include the use of synchronized or individual bots, multiple accounts operated by one social media management tool, or different manipulations of search engines and social network algorithms, all aiming to promote their ideology. …"
  18. 18

    Hashtags data points. حسب Alon Sela (12231559)

    منشور في 2025
    "…Their methods include the use of synchronized or individual bots, multiple accounts operated by one social media management tool, or different manipulations of search engines and social network algorithms, all aiming to promote their ideology. …"
  19. 19

    Bipartite network data points. حسب Alon Sela (12231559)

    منشور في 2025
    "…Their methods include the use of synchronized or individual bots, multiple accounts operated by one social media management tool, or different manipulations of search engines and social network algorithms, all aiming to promote their ideology. …"
  20. 20

    Data sets used for user analysis. حسب Alon Sela (12231559)

    منشور في 2025
    "…Their methods include the use of synchronized or individual bots, multiple accounts operated by one social media management tool, or different manipulations of search engines and social network algorithms, all aiming to promote their ideology. …"