-
1
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Based on the numerous experiments, an optimum distance of inspection is estimated which yields damage detection and localization with high accuracy thereby solving all the aforementioned issues. …”
Get full text
-
2
Android Malware Detection Using Machine Learning
Published 2024“…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
Get full text
article -
3
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
Published 2019“…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
-
4
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
Published 2017“…This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …”
Get full text
Get full text
Get full text
Get full text
article -
5
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019“…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …”
Get full text
Get full text
Get full text
masterThesis -
6
Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine
Published 2024“…In this MOD-POA+ELM algorithm, the modified pelican optimization algorithm (MOD-POA) has been utilized to optimize the parameters of ELM’s hidden neurons. …”
-
7
-
8
Information warfare. (c2015)
Published 2015“…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. …”
Get full text
Get full text
masterThesis -
9
Information warfare
Published 2017“…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …”
Get full text
Get full text
Get full text
Get full text
article -
10
Recovery of business intelligence systems
Published 2018“…The damage assessment must be performed as the intrusion detection system detects the malicious activity. …”
Get full text
Get full text
Get full text
Get full text
article -
11
Information reconciliation through agent controlled graph model. (c2018)
Published 2018“…Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …”
Get full text
Get full text
Get full text
masterThesis -
12
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…Conventional damage detection techniques are gradually being replaced by state-of-the-art smart monitoring and decision-making solutions. …”
Get full text
article -
13
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis