Showing 1 - 13 results of 13 for search 'damage detection algorithm', query time: 0.05s Refine Results
  1. 1

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Based on the numerous experiments, an optimum distance of inspection is estimated which yields damage detection and localization with high accuracy thereby solving all the aforementioned issues. …”
    Get full text
  2. 2

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  3. 3

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents by Muhammad E. H. Chowdhury (14150526)

    Published 2019
    “…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
  4. 4

    Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix by Haraty, Ramzi Ahmed

    Published 2017
    “…This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 5

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems by Boukhari, Bahia

    Published 2019
    “…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 6

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine by Debendra Muduli (20748758)

    Published 2024
    “…In this MOD-POA+ELM algorithm, the modified pelican optimization algorithm (MOD-POA) has been utilized to optimize the parameters of ELM’s hidden neurons. …”
  7. 7
  8. 8

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. …”
    Get full text
    Get full text
    masterThesis
  9. 9

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 10

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…The damage assessment must be performed as the intrusion detection system detects the malicious activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 11

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 12

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights by Malekloo, Arman

    Published 2021
    “…Conventional damage detection techniques are gradually being replaced by state-of-the-art smart monitoring and decision-making solutions. …”
    Get full text
    article
  13. 13