Search alternatives:
augmentation algorithm » recommendation algorithm (Expand Search)
generation algorithm » genetic algorithm (Expand Search)
augmentation algorithm » recommendation algorithm (Expand Search)
generation algorithm » genetic algorithm (Expand Search)
-
1
HVAC system attack detection dataset
Published 2021“…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
-
2
KNNOR: An oversampling technique for imbalanced datasets
Published 2021“…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
-
3
Variable Selection in Data Analysis: A Synthetic Data Toolkit
Published 2024Subjects: Get full text
article -
4
-
5
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
6
Effective uncertain fault diagnosis technique for wind conversion systems using improved ensemble learning algorithm
Published 2023“…Firstly, the establishment of interval centers and ranges, employing upper and lower bounds, effectively manages the inherent uncertainties arising from noise and measurement errors intrinsic to the wind system. Subsequently, the dataset undergoes processing via the Sine-Cosine Optimization Algorithm (SCOA), enabling the extraction of the most pertinent attributes. …”
-
7
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…To evaluate the AAOA, we implemented extensive experiments using twenty-three well-known benchmark functions and eight data clustering datasets. We also evaluated the proposed AAOA with extensive comparisons to different optimization algorithms. …”
-
8
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. …”
-
9
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
Published 2025“…We also apply machine learning algorithms to establish a baseline for deepfake detection on this dataset, contributing to the detection of fraudulent sign language videos.…”
Get full text
article -
10
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce VHDRA, a Vertical and Horizontal Data Reduction Approach, to improve the classification accuracy and speed of the NNGE algorithm and reduce the computational resource consumption. …”
-
11
-
12
-
13
Dataset built for Arabic Sentiment Analysis
Published 2016“…As there is no state of art, we further evaluated our system by providing our dataset to three Arabic native speakers who further confirmed the authenticity of the dataset generated.…”
Get full text
-
14
YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm
Published 2025“…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
-
15
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…Existing benchmark datasets are outdated and limited due to knowledge of specific job postings, which limits the existing models’ capability in detecting fraudulent jobs. …”
-
16
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …”
-
17
K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation
Published 2022“…The KNNOR algorithm has outperformed the state-of-the-art augmentation algorithms by enabling classifiers to achieve much higher accuracy after injecting artificial minority datapoints into imbalanced datasets. …”
-
18
Large-scale annotation dataset for fetal head biometry in ultrasound images
Published 2023“…<p>This dataset features a collection of 3832 high-resolution ultrasound images, each with dimensions of 959×661 pixels, focused on Fetal heads. …”
-
19
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
Published 2024“…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
-
20
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text