Showing 181 - 200 results of 1,410 for search 'use data processing', query time: 0.06s Refine Results
  1. 181
  2. 182
  3. 183
  4. 184
  5. 185

    Quality data at a reduced price by Semaan, Mars E.

    Published 1995
    “…Extensive testing of processing tools and interpolation techniques on the most dense part of the survey, before completion of the acquisition, led to an efficient processing sequence that resulted in high quality data meeting all the user's objectives. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 186

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. …”
  7. 187
  8. 188

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
  9. 189
  10. 190

    PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping by Arvind Prasad (19997799)

    Published 2024
    “…Additionally, a new strategy using similarity-based selective training reduces the amount of data required for the training of an incremental learning-based model, focusing on the most relevant data to improve efficiency. …”
  11. 191
  12. 192
  13. 193

    Household-Level Energy Forecasting in Smart Buildings Using a Novel Hybrid Deep Learning Model by Dabeeruddin Syed (16864260)

    Published 2021
    “…The proposed framework consists of two stages, namely, data cleaning, and model building. The data cleaning phase applies pre-processing techniques to the raw data and adds additional features of lag values. …”
  14. 194

    DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET by M. Poongodi (14158869)

    Published 2019
    “…Occasionally, the malicious node transmits the counterfeit data amid other nodes. To find out trust/belief is deemed to be a difficult task when the malicious nodes try to distort the discovery of route or transmission of data within the network. …”
  15. 195
  16. 196
  17. 197
  18. 198
  19. 199
  20. 200