Search alternatives:
perception algorithm » auction algorithm (Expand Search)
junction algorithm » auction algorithm (Expand Search)
Showing 1 - 20 results of 34 for search 'users ((((perception algorithm) OR (junction algorithm))) OR (detection algorithm))', query time: 0.13s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…The final classification decision for both models is estimated by incorporating the node's past behavior with the machine learning algorithm. Any detected attack reduces the trustworthiness of the nodes involved, leading to a dynamic system cleansing. …”
  5. 5

    A machine learning model for early detection of diabetic foot using thermogram images by Amith Khandakar (14151981)

    Published 2021
    “…A comparison of the inference time for the best-performing networks confirmed that the proposed algorithm can be deployed as a smartphone application to allow the user to monitor the progression of the DFU in a home setting.…”
  6. 6
  7. 7
  8. 8

    Malicious URL and Intrusion Detection using Machine Learning by Hamza, Amr

    Published 2024
    “…Experimental results demonstrated that the ML algorithms were able to achieve high accuracy in predicting website maliciousness and intrusion detection. …”
    Get full text
    article
  9. 9
  10. 10
  11. 11

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives by Yassine Himeur (14158821)

    Published 2021
    “…If leveraged properly, that data could assist end-users, energy producers and utility companies in detecting anomalous power consumption and understanding the causes of each anomaly. …”
  12. 12
  13. 13

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems by Faria Nawshin (21841598)

    Published 2025
    “…However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. …”
  14. 14

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks by Yassine Himeur (14158821)

    Published 2022
    “…The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. Besides micro-moment features extraction, we also experiment with a deep neural network architecture for efficient abnormality detection and classification. …”
  15. 15

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  16. 16
  17. 17

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach by Nagendra Prabhu Selvaraj (17542041)

    Published 2022
    “…On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …”
  18. 18
  19. 19

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring by Aya Nabil Sayed (17317006)

    Published 2024
    “…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
  20. 20

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”