Search alternatives:
augmentation algorithm » recommendation algorithm (Expand Search)
generation algorithm » genetic algorithm (Expand Search)
Showing 1 - 20 results of 150 for search 'dataset ((augmentation algorithm) OR (((generation algorithm) OR (detection algorithm))))', query time: 0.13s Refine Results
  1. 1

    HVAC system attack detection dataset by Mariam Elnour (14147790)

    Published 2021
    “…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
  2. 2

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  3. 3
  4. 4
  5. 5

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  6. 6

    Effective uncertain fault diagnosis technique for wind conversion systems using improved ensemble learning algorithm by Khadija Attouri (18024307)

    Published 2023
    “…Firstly, the establishment of interval centers and ranges, employing upper and lower bounds, effectively manages the inherent uncertainties arising from noise and measurement errors intrinsic to the wind system. Subsequently, the dataset undergoes processing via the Sine-Cosine Optimization Algorithm (SCOA), enabling the extraction of the most pertinent attributes. …”
  7. 7

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering by Abu Zitar, Raed

    Published 2022
    “…To evaluate the AAOA, we implemented extensive experiments using twenty-three well-known benchmark functions and eight data clustering datasets. We also evaluated the proposed AAOA with extensive comparisons to different optimization algorithms. …”
  8. 8

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. …”
  9. 9

    Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis by Naeem, Shahzeb

    Published 2025
    “…We also apply machine learning algorithms to establish a baseline for deepfake detection on this dataset, contributing to the detection of fraudulent sign language videos.…”
    Get full text
    article
  10. 10

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce VHDRA, a Vertical and Horizontal Data Reduction Approach, to improve the classification accuracy and speed of the NNGE algorithm and reduce the computational resource consumption. …”
  11. 11
  12. 12
  13. 13

    Dataset built for Arabic Sentiment Analysis by AL MUKHAITI, AYESHA JUMAA SALEM

    Published 2016
    “…As there is no state of art, we further evaluated our system by providing our dataset to three Arabic native speakers who further confirmed the authenticity of the dataset generated.…”
    Get full text
  14. 14

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm by Prabu Selvam (22330264)

    Published 2025
    “…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
  15. 15

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…Existing benchmark datasets are outdated and limited due to knowledge of specific job postings, which limits the existing models’ capability in detecting fraudulent jobs. …”
  16. 16

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …”
  17. 17

    K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation by Ashhadul Islam (16869981)

    Published 2022
    “…The KNNOR algorithm has outperformed the state-of-the-art augmentation algorithms by enabling classifiers to achieve much higher accuracy after injecting artificial minority datapoints into imbalanced datasets. …”
  18. 18

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…<p>This dataset features a collection of 3832 high-resolution ultrasound images, each with dimensions of 959×661 pixels, focused on Fetal heads. …”
  19. 19

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  20. 20

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text