Search

Your search keyword '"SELAMAT, ALI"' showing total 1,381 results

Search Constraints

Start Over You searched for: Author "SELAMAT, ALI" Remove constraint Author: "SELAMAT, ALI"
1,381 results on '"SELAMAT, ALI"'

Search Results

1. Fog-Based Ransomware Detection for Internet of Medical Things Using Lighweight Machine Learning Algorithms

2. Explainable Machine Learning for Intrusion Detection

3. An Empirical Analysis of Machine Learning Efficacy in Anti-Ransomware Tools

6. Obfuscated Malware Detection: Impacts on Detection Methods

9. Perspective and Suitable Research Area in Public Research-Patent Analysis of the Czech Public Universities

15. Cycle Route Signs Detection Using Deep Learning

16. WHTE: Weighted Hoeffding Tree Ensemble for Network Attack Detection at Fog-IoMT

17. An Improved Ensemble Deep Learning Model Based on CNN for Malicious Website Detection

18. Sperm-cell Detection Using YOLOv5 Architecture

21. Recent Research on Phishing Detection Through Machine Learning Algorithm

25. Finger-Vein Classification Using Granular Support Vector Machine

27. A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works

28. Session Based Recommendations Using Char-Level Recurrent Neural Networks

30. The Most Potential Decision Tree Technique to Classify the Large Dataset of Students

31. Session Based Recommendations Using Recurrent Neural Networks - Long Short-Term Memory

32. Imputation of Rainfall Data Using Improved Neural Network Algorithm

42. Missing Data Characteristics and the Choice of Imputation Technique: An Empirical Study

43. Brain MRI Modality Understanding: A Guide for Image Processing and Segmentation

44. Medical Image Data Upscaling with Generative Adversarial Networks

45. Novel Thermal Image Classification Based on Techniques Derived from Mathematical Morphology: Case of Breast Cancer

46. A Mini Review on Parallel Processing of Brain Magnetic Resonance Imaging

48. Quantifying the Return of Security Investments for Technology Startups.

49. Phishing Hybrid Feature-Based Classifier by Using Recursive Features Subset Selection and Machine Learning Algorithms

50. Hybrid Distributed Computing System Based on Canvas and Dynamo

Catalog

Books, media, physical & digital resources