Search alternatives:
false detection » fire detection (Expand Search), change detection (Expand Search)
code selection » gene selection (Expand Search)
false detection » fire detection (Expand Search), change detection (Expand Search)
code selection » gene selection (Expand Search)
-
1
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …”
-
2
-
3
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
4
Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks
Published 2004“…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …”
Get full text
Get full text
article -
5
Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions
Published 2017“…For this purpose, computer programs based on updated pattern recognition algorithms were developed for joint-detection and classification of rock types to offer an estimated strength. …”
Get full text
Get full text
Get full text
conferenceObject -
6
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
7
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…Consequently, TICDS has better performance than the state of art techniques in terms of accuracy detection, while providing good detection and false alarm rates.…”
-
8
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
9
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
10
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …”
Get full text
-
11
-
12
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. The optimization is applied to a formulated cost function that considers uncertainty, false alarms, and existing clutters. …”
Get full text
-
13
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…The results revealed that the RFBXSQLQC technique outperforms the existing algorithms by 19% with pattern detection accuracy, 34% minimized time complexity, 64% false-positive rate, and 31% in terms of computational overhead.…”
-
15
-
16
CEAP
Published 2016“…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
Get full text
Get full text
Get full text
Get full text
article -
17
COMPUTER AIDED PROGRAMMING EDUCATION (CAPE)
Published 2020“…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
Get full text
article -
18
UML-based regression testing for OO software
Published 2010“…Previous techniques have been mainly code-based and several of them have addressed procedural programs. …”
Get full text
Get full text
Get full text
article -
19
Diagnostic test accuracy of AI-assisted mammography for breast imaging: a narrative review
Published 2025“…Artificial intelligence (AI), with its ability to process vast amounts of data and detect intricate patterns, offers a solution to the limitations of traditional mammography, including missed diagnoses and false positives. …”
-
20
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…Additionally, the TON-IoT dataset demonstrated a remarkable accuracy rate of 99.00%, with minimal drops and low false alert rates. The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”