Search alternatives:
method » methods (Expand Search)
Showing 981 - 1,000 results of 8,230 for search 'Optimal detection method', query time: 0.22s Refine Results
  1. 981

    Investigation of Effects of Thermal Radiation, Magnetic Field, Eckert Number, and Thermal Slip on MHD Hiemenz Flow by Optimal Homotopy Asymptotic Method by Solomon Bati Kejela, Mitiku Daba, Abebe Girum

    Published 2021-01-01
    “…Similarity variable conversion method has been applied to transmute the fundamental governing equations of the fluid dynamics in flow into a pair of nonlinear third-order ordinary differential equations and is analytically solved by the optimal homotopy asymptotic method (OHAM). …”
    Get full text
    Article
  2. 982

    The optimization path of agricultural industry structure and intelligent transformation by deep learning by Xingchen Pan, Jinyu Chen

    Published 2024-11-01
    “…Subsequently, a hybrid optimization method is designed, combining the Genetic Algorithms with particle swarm optimization to improve the model’s global search capability and local convergence speed. …”
    Get full text
    Article
  3. 983

    Improving an endangered marine species distribution using reliable and localized environmental DNA detections combined with trawl captures by Marion Chevrinais, Audrey Bourret, Geneviève Côté, Geneviève Faille, Nellie Gagné, Geneviève J. Parent

    Published 2025-04-01
    “…Recent studies suggest that combining traditional capture methods and environmental DNA (eDNA) detections enhance rare species’ occurrence. …”
    Get full text
    Article
  4. 984
  5. 985

    Optimization of GC-MS Method for Analysis of Basil Essential Oils from Algeria: Design of Experiments and Exploratory Pattern Recognition by Nabila Slougui, Meriem Slama, Yasser Boudaoud, Aymene Salah Bendrihem

    Published 2022-01-01
    “…This set of conditions was later used for the optimization of the final method. The optimal experimental conditions were subsequently obtained by response surface optimization (isotherm duration = 6.2 min and slope = 1.06°C/min). …”
    Get full text
    Article
  6. 986

    Node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network by Zhanjun Hao, Nanjiang Qu, Xiaochao Dang, Jiaojiao Hou

    Published 2019-08-01
    “…For this reason, a node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network is proposed in this article. …”
    Get full text
    Article
  7. 987
  8. 988
  9. 989
  10. 990

    Optimization of Beamforming and Transmit Power Using DQN and Comparison With Traditional Techniques by Parmida Geranmayeh, Eckhard Grass

    Published 2025-01-01
    “…These technologies enhance wireless communication by leveraging deep neural networks and data-driven methods to optimize resource allocation, signal detection, and channel coding. …”
    Get full text
    Article
  11. 991

    Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles by Naif Almakayeel

    Published 2024-10-01
    “…To efficiently counter new malware variants, novel techniques distinct from conventional methods must be utilized. Machine learning (ML) techniques cannot detect every new and complex malware variant. …”
    Get full text
    Article
  12. 992

    EEG-Based Emotion Detection Using Roberts Similarity and PSO Feature Selection by Mustafa Hussein Mohammed, Mustafa Noaman Kadhim, Dhiah Al-Shammary, Ayman Ibaida

    Published 2025-01-01
    “…Evaluation on an EEG brainwave dataset demonstrated that the method achieved an accuracy of 98.75% with feature selection, compared to 94.04% without it in emotional state detection. …”
    Get full text
    Article
  13. 993

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…The ACAD-BMDL method mainly focuses on enhancing security in the CPS environment via the cyberattack detection process. …”
    Get full text
    Article
  14. 994
  15. 995

    Efficient sepsis detection using deep learning and residual convolutional networks by Ahmed S. Almasoud, Ghada Moh Samir Elhessewi, Munya A. Arasi, Abdulsamad Ebrahim Yahya, Menwa Alshammeri, Donia Badawood, Faisal Mohammed Nafie, Mohammed Assiri

    Published 2025-07-01
    “…In this article, we present a new deep learning model to detect the occurrence of sepsis and the African vulture optimization algorithm (AVOA) to enhance the model performance. …”
    Get full text
    Article
  16. 996

    Class-weighted Dempster–Shafer in dual-level fusion for multimodal fake real estate listings detection by Maifuza Mohd Amin, Nor Samsiah Sani, Mohammad Faidzul Nasrudin

    Published 2025-05-01
    “…Furthermore, a new weighting scheme is introduced to optimize Dempster–Shafer in decision fusion to help the model achieve optimal performance and as a result, our method improves the classification. …”
    Get full text
    Article
  17. 997
  18. 998

    Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments by Pardis Sadatian Moghaddam, Ali Vaziri, Sarvenaz Sadat Khatami, Francisco Hernando-Gallego, Diego Martín

    Published 2025-06-01
    “…Traditional detection methods often fall short in identifying multi-class attacks, particularly in the presence of high-dimensional and imbalanced IoT traffic. …”
    Get full text
    Article
  19. 999

    Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection by Nwamaka Georgenia Ezeji, Kingsley Ifeanyi Chibueze, Nnenna Harmony Nwobodo-Nzeribe

    Published 2024-09-01
    “… Electricity theft is a significant challenge for utility companies worldwide, leading to substantial economic losses and inefficiencies in power distribution. Traditional methods of detecting electricity theft, such as manual inspections and routine audits, are often inefficient and ineffective. …”
    Get full text
    Article
  20. 1000

    Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments by G. Nalinipriya, S. Rama Sree, K. Radhika, E. Laxmi Lydia, Faten Khalid Karim, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-07-01
    “…Machine learning (ML) plays a crucial role in cybersecurity by making malware detection more scalable, efficient, and automated, reducing reliance on conventional human intervention methods. …”
    Get full text
    Article