Showing 21 - 40 results of 88 for search 'order ((selection algorithm) OR (detection algorithm))', query time: 0.07s Refine Results
  1. 21
  2. 22
  3. 23

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
    Get full text
    Get full text
    Get full text
    article
  4. 24

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
    Get full text
  5. 25
  6. 26

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. …”
    Get full text
  7. 27
  8. 28

    Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering by El-Maleh, Aiman H.

    Published 2006
    “…Test vectors are decomposed and clustered in an increasing order of faults detection count. This clustering order gives more degree of freedom and results in better compaction. …”
    Get full text
    article
  9. 29

    Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection by Serkan Kiranyaz (3762058)

    Published 2020
    “…<p>Echocardiogram (echo) is the earliest and the primary tool for identifying regional wall motion abnormalities (RWMA) in order to diagnose myocardial infarction (MI) or commonly known as heart attack. …”
  10. 30

    A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015) by Wehbe, Gioia Wahib

    Published 2016
    “…Our algorithm first performs a feature selection step to define differentiable SNPs. …”
    Get full text
    Get full text
    masterThesis
  11. 31
  12. 32

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…Finally, the research note demonstrates how REBUS detects classes in models with higher order (multidimensional) constructs, which are often the case in tourism research.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 33

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks by Yassine Himeur (14158821)

    Published 2022
    “…Experimental results on simulated and real datasets collected at two regions, which have extremely different climate conditions, confirm that the proposed deep micro-moment architecture outperforms other machine learning algorithms and can effectively detect anomalous patterns. …”
  14. 34

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  15. 35

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios by Hasan Abbas Al-Mohammed (16810674)

    Published 2021
    “…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …”
  16. 36

    New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n) by Gutub, Adnan

    Published 2002
    “…We suggest a new correction phase for a previously proposed almost Montgomery inverse algorithm to calculate the inversion in hardware. It is also presented how to obtain a fast hardware algorithm to compute the inverse by multi-bit shifting method. …”
    Get full text
    Get full text
    masterThesis
  17. 37

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  18. 38
  19. 39
  20. 40