Search alternatives:
detection data » detection a (Expand Search)
decrease » increase (Expand Search)
Showing 1 - 20 results of 273 for search '(( significant ((force decrease) OR (fold decrease)) ) OR ( significant detection data ))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…However, unsupervised data mining techniques are reliable in detecting fraud before they happen. …”
    Get full text
  4. 4
  5. 5
  6. 6

    Network Packet Transformation Approaches for Intrusion Detection Systems: A Survey by Somaya Eltanbouly (22565864)

    Published 2025
    “…While machine learning and deep learning techniques hold significant promise for enhancing these systems, their performance is highly dependent on how network traffic data is transformed and represented. …”
  7. 7
  8. 8
  9. 9

    Anomalies Detection in Software by Conceptual Learning From Normal Executions by Ahmad Qadeib Alban (16855206)

    Published 2020
    “…<p>Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? …”
  10. 10

    Using XAI Techniques to Detect Targeted Data Poisoning Attacks on Healthcare Applications of Machine Learning Systems by Eyad Dhaher Megdadi

    Published 2025
    “…This research study explores the application of Explainable Artificial Intelligence (XAI) methods for detecting targeted data poisoning attacks in healthcare machine learning systems. …”
    Get full text
  11. 11

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones by Syeda Nazia Ashraf (17541222)

    Published 2023
    “…In recent years, there has been a significant increase in the utilization of IoT-enabled drone data management technology. …”
  12. 12
  13. 13

    Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges by Sk Injamamul Islam (14111241)

    Published 2024
    “…Therefore, new techniques and technical solutions for disease management in aquaculture are required. In this context, data analytics technologies, such as internet of things (IoT) sensors, artificial intelligence, and machine learning, allow farmers to proactively monitor their farms and detect potential disease outbreaks before they strike. …”
  14. 14
  15. 15

    How effective are synthetic attack models to detect real-world energy theft? by Emran Altamimi (21397883)

    Published 2025
    “…However, available datasets lack annotated real anomalies, which poses significant challenges in developing effective detection systems. …”
  16. 16

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…This poses some problems for the large volume data and hinders the scalability of any detection system. …”
  17. 17

    PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping by Arvind Prasad (19997799)

    Published 2024
    “…This paper introduces PermGuard, a scalable framework for Android malware detection that maps permissions into exploitation techniques and employs incremental learning to detect malicious apps. …”
  18. 18

    Deep learning-based marine big data fusion for ocean environment monitoring: Towards shape optimization and salient objects detection by Sulaiman Khan (12585349)

    Published 2023
    “…This research study presents a data fusion-based method for underwater salient object detection and ocean environment monitoring by utilizing a deep model.…”
  19. 19

    Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection by Shakeel Ahmad (702854)

    Published 2024
    “…These attacks can be detected using both traditional and modern AI-based models. …”
  20. 20