Showing 21 - 40 results of 205 for search '(( element rd algorithm ) OR ((( data detection algorithm ) OR ( data code algorithm ))))', query time: 0.16s Refine Results
  1. 21

    Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions by Liu, Wenpeng

    Published 2017
    “…This paper reviews testing procedures, data analysis, updated algorithms used for joint detection, and discusses the latest round of testing in samples with simulated joints at various angles along the borehole.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 22

    Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems by Amal Hichri (21383672)

    Published 2022
    “…The classification performance is determined via different metrics for various GA-based ANN classifiers using data extracted from the healthy and faulty data of the GCPV system. …”
  3. 23

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 24

    HVAC system attack detection dataset by Mariam Elnour (14147790)

    Published 2021
    “…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
  5. 25

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  6. 26
  7. 27
  8. 28

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  9. 29
  10. 30

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …”
  11. 31

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  12. 32

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems by Boukhari, Bahia

    Published 2019
    “…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 33

    Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges by Sk Injamamul Islam (14111241)

    Published 2024
    “…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …”
  14. 34

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  15. 35

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”
  16. 36

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
  17. 37

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …”
  18. 38

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  19. 39

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  20. 40