بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
systems using » system using (توسيع البحث)
element deer » elementi per (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
systems using » system using (توسيع البحث)
element deer » elementi per (توسيع البحث)
-
1
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
احصل على النص الكامل
احصل على النص الكامل
-
2
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
منشور في 2019"…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
3
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
منشور في 2023"…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …"
-
4
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
منشور في 2022"…The classification performance is determined via different metrics for various GA-based ANN classifiers using data extracted from the healthy and faulty data of the GCPV system. …"
-
5
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. …"
احصل على النص الكامل
-
6
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …"
-
7
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
منشور في 2006"…A fast waveform sampling facility has been recently developed and integrated into the VAX-based data acquisition system at the Center for Applied Physical Sciences (CAPS). …"
احصل على النص الكامل
احصل على النص الكامل
article -
8
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
-
9
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…The final classification decision for both models is estimated by incorporating the node's past behavior with the machine learning algorithm. Any detected attack reduces the trustworthiness of the nodes involved, leading to a dynamic system cleansing. …"
-
10
-
11
Android Malware Detection Using Machine Learning
منشور في 2024"…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
احصل على النص الكامل
article -
12
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
منشور في 2022"…The proposed improved ABO method consists in reducing the number of samples in the training data set using the Euclidean distance and extracting the most significant features from the reduced data using ABO algorithm. …"
-
13
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
منشور في 2019"…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …"
-
14
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
منشور في 2025"…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …"
-
15
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
منشور في 2023"…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …"
-
16
HVAC system attack detection dataset
منشور في 2021"…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
-
17
Control of nonlinear dynamical systems using genetic algorithms
منشور في 1997"…This paper introduces a new method for the control of nonlinear systems using genetic algorithms. The proposed method formulates the nonlinear controller design as an optimization problem and genetic algorithms are used in the optimization process. …"
احصل على النص الكامل
احصل على النص الكامل
article -
18
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
19
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
منشور في 2020"…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
-
20