Search alternatives:
second detection » drone detection (Expand Search), ion detection (Expand Search), island detection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
second detection » drone detection (Expand Search), ion detection (Expand Search), island detection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
21
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
Published 2022“…The performance of the proposed bot detection system in the internet environment is analyzed latency, detection rate, packet delivery ration, energy availability and precision.…”
-
22
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
23
-
24
-
25
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
-
26
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…ML based informal diagnostic and decision support systems can provide a first line of detection to alert patients about potential disease risk. …”
Get full text
-
27
-
28
Optimizing ADWIN for Steady Streams
Published 2022“…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …”
Get full text
Get full text
Get full text
-
29
CEAP
Published 2016“…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
Get full text
Get full text
Get full text
Get full text
article -
30
-
31
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
Published 2024“…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
Get full text
-
32
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…<p>This paper proposes effective Random Forest (RF)-based fault detection and diagnosis for wind energy conversion (WEC) systems. …”
-
33
-
34
A GENERAL REAL-TIME DECODER BASED ON AMD2900 DEVICES
Published 2020“…First, bit-slice microprocessors are used and ALU word length is chosen to be equal to that of a code word. Second, decoding operation is accomplished in two steps, namely (1) Error detection and (2) Error correction. …”
Get full text
article -
35
-
36
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
37
Developing a framework for using face recognition in transit payment transactions
Published 2021“…On the other hand, a tremendous advancement has been noticed in the human face detection and recognition technology which mainly used to authenticate and identify person face from a group of people through detecting a unique feature of the face and ignore the background image then compare the outcomes with the registered faces in the database to identify the person. …”
Get full text
-
38
-
39
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
40
UML-based regression testing for OO software
Published 2010“…In the first phase, we select both unit and system test cases that directly traverse the changed methods and their calling methods. For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article