-
1
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
2
New enumeration algorithm for regular boolean functions
Published 2018“…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…<p dir="ltr">In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
-
4
Unsupervised outlier detection in multidimensional data
Published 2022“…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …”
-
5
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
6
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Several algorithms have been proposed in the literature for synthesis of multiple valued logic functions. …”
Get full text
Get full text
article -
7
Distributed dimension reduction algorithms for widely dispersed data
Published 2002“…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…”
Get full text
Get full text
Get full text
conferenceObject -
8
A neural networks algorithm for data path synthesis
Published 2003“…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
Get full text
Get full text
Get full text
article -
9
Android Malware Detection Using Machine Learning
Published 2024“…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
Get full text
article -
10
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…We experimentally analyze some properties of simulated annealing algorithms (SA) and genetic algorithms (GA) for mapping data to multicomputers. …”
Get full text
Get full text
Get full text
article -
11
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
12
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
13
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
14
-
15
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…Gamma pulses from a 3" Na(TI) scintillation detector were captured as single and double pulses for the purpose of testing the peak detection algorithms. The pulse classification technique was tested successfully on a TMS320C6000 high performance floating-point processor yielding a reduction of the execution time to 2 msec…”
Get full text
Get full text
article -
16
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
17
-
18
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text
-
19
-
20