Search alternatives:
base detection » image detection (Expand Search), fire detection (Expand Search), change detection (Expand Search)
base detection » image detection (Expand Search), fire detection (Expand Search), change detection (Expand Search)
-
61
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
62
-
63
Creating and detecting fake reviews of online products
Published 2022“…In this research, we address the creation and detection of fake reviews. First, we experiment with two language models, ULMFiT and GPT-2, to generate fake product reviews based on an Amazon e-commerce dataset. …”
-
64
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…We, therefore, Propose in this paper, a handcrafted feature based Writer-Independent (WI) signature verification system to detect synthetic writers and signatures through handcrafted features. …”
Get full text
-
65
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
66
Computer-aided detection of Melanoma using geometric features
Published 2017“…The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
67
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …”
-
68
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
69
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
70
Detection of statistically significant network changes in complex biological networks
Published 2017“…In addition, its application highlights several novel candidates that cannot be detected by standard single network-based approaches.…”
-
71
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
Get full text
-
72
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
73
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007Get full text
Get full text
conferenceObject -
74
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
76
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
77
A decoding algorithm for I-Q space-time coded systems in fadingenvironments
Published 2000“…Therefore, a simplified decoding algorithm is proposed. It is based on symbol-by-symbol detection of the Q/I components in the I/Q decoders. …”
Get full text
Get full text
article -
78
-
79
-
80
A Novel Fault Diagnosis of Uncertain Systems Based on Interval Gaussian Process Regression: Application to Wind Energy Conversion Systems
Published 2020“…Thus, this paper proposes a novel Interval Gaussian Process Regression (IGPR)-based Random Forest (RF) technique (IGPR-RF) for diagnosing uncertain WEC systems. …”