Search alternatives:
function algorithm » auction algorithm (Expand Search)
Showing 41 - 60 results of 253 for search 'data ((function algorithm) OR (detection algorithm))', query time: 0.10s Refine Results
  1. 41

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  2. 42

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
  3. 43

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”
  4. 44

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …”
  5. 45

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  6. 46

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents by Muhammad E. H. Chowdhury (14150526)

    Published 2019
    “…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
  7. 47

    Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization by Abu Zitar, Raed

    Published 2022
    “…The IGOA was compared with several other proposed meta-heuristic algorithms. Moreover, the Wilcoxon signed-rank test further assessed the experimental results to conduct more systematic data analyses. …”
    Get full text
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53

    A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation by Khaled Dhibi (16891524)

    Published 2021
    “…<p>This paper proposes a novel fault detection and diagnosis (FDD) technique for grid-tied PV systems. …”
  14. 54

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review by Avneet Kaur (712349)

    Published 2024
    “…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”
  15. 55

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
  16. 56

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. It detects and simultaneously protects the IoMT network from further intrusion with only a 0.18% service interruption rate. …”
  17. 57

    Deep and transfer learning for building occupancy detection: A review and comparative analysis by Aya Nabil Sayed (17317006)

    Published 2022
    “…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …”
  18. 58
  19. 59

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…The proposed algorithm has successfully maintained homogeneity to the original data set, reduced the execution time and occupied storage space, and led to decent monitoring performance.…”
  20. 60

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
    Get full text
    Get full text
    Get full text
    conferenceObject