Search alternatives:
code encryption » secure encryption (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
code encryption » secure encryption (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
-
1
-
2
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
3
-
4
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…Obtained results using 4000 synthetic writers of GPDS synthetic database show that the proposed handcrafted features have considerable ability to detect synthetic signatures vs. two widely used real individuals signatures databases, namely CEDAR and GPDS-300, which reach 98.67% and 94.05% of successful synthetic detection rates respectively.…”
Get full text
-
5
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
6
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
7
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
Get full text
-
8
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
9
-
10
Multi-Objective Co-optimization of Power and Gas under Uncertainties with P2H embedded
Published 2022Get full text
doctoralThesis -
11
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
Published 2024“…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”
-
12
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…<p dir="ltr">The Cypher Physical Power Systems (CPPS) became vital targets for intruders because of the large volume of high speed heterogeneous data provided from the Wide Area Measurement Systems (WAMS). The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
-
13
-
14
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…One of the widely used data-driven FDD methods is the Principal Component Analysis (PCA). …”
-
15
-
16
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …”
-
17
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…We also implemented and compared state-of-the-art methods to score sleep-wake stages, which range from the widely used traditional algorithms to recent machine learning approaches. …”
-
18
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …”
-
19
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”
-
20
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. …”