Search alternatives:
code selection » gene selection (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
code selection » gene selection (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
-
1
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …”
-
2
-
3
Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks
Published 2004“…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …”
Get full text
Get full text
article -
4
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
5
-
6
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
7
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…Obtained results using 4000 synthetic writers of GPDS synthetic database show that the proposed handcrafted features have considerable ability to detect synthetic signatures vs. two widely used real individuals signatures databases, namely CEDAR and GPDS-300, which reach 98.67% and 94.05% of successful synthetic detection rates respectively.…”
Get full text
-
8
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …”
Get full text
-
9
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
10
-
11
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
12
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
Get full text
-
13
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
14
-
15
Multi-Objective Co-optimization of Power and Gas under Uncertainties with P2H embedded
Published 2022Get full text
doctoralThesis -
16
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
Published 2024“…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”
-
17
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…<p dir="ltr">The Cypher Physical Power Systems (CPPS) became vital targets for intruders because of the large volume of high speed heterogeneous data provided from the Wide Area Measurement Systems (WAMS). The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
-
18
-
19
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…One of the widely used data-driven FDD methods is the Principal Component Analysis (PCA). …”
-
20