يعرض 1 - 20 نتائج من 24 نتيجة بحث عن 'multi dataset detection algorithm', وقت الاستعلام: 0.07s تنقيح النتائج
  1. 1
  2. 2

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems حسب Hisham A. Kholidy (18891802)

    منشور في 2019
    "…The experiments show that the overall performance of VHDRA using both the vertical and the horizontal reduction reduces the NNGE hyperrectangles by 29.06%, 37.34%, and 26.76% and improves the accuracy of the NNGE by 8.57%, 4.19%, and 3.78% using the Multi-, Binary, and Triple class datasets, respectively.…"
  3. 3
  4. 4

    MSD-NAS: multi-scale dense neural architecture search for real-time pedestrian lane detection حسب Sui Paul Ang (18460605)

    منشور في 2023
    "…<p dir="ltr">Accurate detection of pedestrian lanes is a crucial criterion for vision-impaired people to navigate freely and safely. …"
  5. 5

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm حسب Prabu Selvam (22330264)

    منشور في 2025
    "…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …"
  6. 6
  7. 7

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
  8. 8

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …"
  9. 9

    Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment حسب Surjeet Dalal (4906894)

    منشور في 2023
    "…In this paper, we propose a highly Boosted Neural Network to detect the multi-stageattack scenario. This paper demonstrated the results of executing various machine learning algorithms and proposed an enormously boosted neural network. …"
  10. 10

    NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY حسب JINESH, PADIKKAPPARAMBIL

    منشور في 2022
    "…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …"
    احصل على النص الكامل
  11. 11
  12. 12

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT حسب Harun Surej Ilango (17545728)

    منشور في 2022
    "…The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …"
  13. 13

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…The experimental results on the CICMalDroid 2020, KronoDroid, and AndroZoo Android malware detection datasets demonstrate a significant attack success rate, with a reduction of accuracy from 96–97% down to 24–29%, which surpasses the traditional FGSM and PGD variants. …"
  14. 14
  15. 15

    YOLO-SAIL: Attention-Enhanced YOLOv5 With Optimized Bi-FPN for Ship Target Detection in SAR Images حسب Prabu Selvam (22330264)

    منشور في 2025
    "…We evaluated YOLO-SAIL against two public benchmark datasets, the SAR Ship Detection Dataset (SSDD) and the High Resolution SAR Images Dataset (HRSID). …"
  16. 16
  17. 17

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
  18. 18

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques حسب Joao Palotti (8479842)

    منشور في 2019
    "…We propose the adoption of this publicly available large dataset, which is at least one order of magnitude larger than any other dataset, to systematically compare existing methods for the detection of sleep-wake stages, thus fostering the creation of new algorithms. …"
  20. 20