Showing 121 - 140 results of 179 for search '(( element data algorithm ) OR ((( detection system algorithm ) OR ( neural coding algorithm ))))', query time: 0.10s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124
  5. 125

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…As a result, the Intrusion Detection System (IDS) is a core component of a modern IoT platform. …”
  6. 126

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …”
  7. 127
  8. 128
  9. 129
  10. 130

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …”
  11. 131

    Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters by Sakib Mahmud (15302404)

    Published 2025
    “…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”
  12. 132

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations by Mueen Uddin (4903510)

    Published 2025
    “…This research paper explores GAI in enhancing cybersecurity by leveraging AI Models and algorithms. GAI can autonomously address common security issues, detect novel threats, and augment human intervention in critical security aspects. …”
  13. 133
  14. 134

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…Consequently, the proposed hybrid deep learning anomaly detection approaches not only enhance IoT security but also provide a robust control system for addressing emerging multivariate cyber threats.…”
  15. 135

    Artificial Intelligence and Machine Learning Applications in Sudden Cardiac Arrest Prediction and Management: A Comprehensive Review by Sarah Aqel (17787809)

    Published 2023
    “…Sudden cardiac arrest (SCA) continues to be a major global cause of death, with survival rates remaining low despite advanced first responder systems. The ongoing challenge is the prediction and prevention of SCA. …”
  16. 136
  17. 137
  18. 138

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…The features of the proposed system are: 1) a metric for color matching to discriminate the balls from their background; 2) a uniform and spiral search approach to speed up the detection; 3) tracking in the presence of partial occlusion; 4) consolidate detection by using shape and geometric matching; and 5) dynamic update of the reference colors. …”
    Get full text
    Get full text
    article
  19. 139

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…As a result, the Intrusion Detection System (IDS) is a core component of a modern IoT platform. …”
    Get full text
    Get full text
    Get full text
    article
  20. 140

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …”
    Get full text
    Get full text
    Get full text