يعرض 1 - 20 نتائج من 920 نتيجة بحث عن '(((( data detection algorithm ) OR ( system using algorithm ))) OR ( element data algorithm ))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 1

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
    احصل على النص الكامل
    احصل على النص الكامل
  2. 2

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems حسب Boukhari, Bahia

    منشور في 2019
    "…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  3. 3

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …"
  4. 4

    Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems حسب Amal Hichri (21383672)

    منشور في 2022
    "…The classification performance is determined via different metrics for various GA-based ANN classifiers using data extracted from the healthy and faulty data of the GCPV system. …"
  5. 5

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy حسب Raad, M.W.

    منشور في 2006
    "…A fast waveform sampling facility has been recently developed and integrated into the VAX-based data acquisition system at the Center for Applied Physical Sciences (CAPS). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. …"
    احصل على النص الكامل
  7. 7

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
  8. 8

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …"
  9. 9

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…The final classification decision for both models is estimated by incorporating the node's past behavior with the machine learning algorithm. Any detected attack reduces the trustworthiness of the nodes involved, leading to a dynamic system cleansing. …"
  10. 10
  11. 11

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
    احصل على النص الكامل
    article
  12. 12

    Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems حسب Majdi Mansouri (16869885)

    منشور في 2022
    "…The proposed improved ABO method consists in reducing the number of samples in the training data set using the Euclidean distance and extracting the most significant features from the reduced data using ABO algorithm. …"
  13. 13

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents حسب Muhammad E. H. Chowdhury (14150526)

    منشور في 2019
    "…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …"
  14. 14

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …"
  15. 15

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …"
  16. 16

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
  17. 17

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  18. 18

    Control of nonlinear dynamical systems using genetic algorithms حسب Al-Duwaish, H.N.

    منشور في 1997
    "…This paper introduces a new method for the control of nonlinear systems using genetic algorithms. The proposed method formulates the nonlinear controller design as an optimization problem and genetic algorithms are used in the optimization process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19
  20. 20

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل