بدائل البحث:
augmentation algorithm » recommendation algorithm (توسيع البحث)
يعرض 1 - 20 نتائج من 107 نتيجة بحث عن 'dataset ((augmentation algorithm) OR (detection algorithm))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 1

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
  2. 2

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed method is compared with the ten top performing contemporary oversamplers by testing the accuracy of classifiers trained on augmented data provided by each oversampler. The experimental results on several common imbalanced datasets show that our method ranks first more consistently than the other state-of-art oversamplers. …"
  3. 3
  4. 4

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering حسب Abu Zitar, Raed

    منشور في 2022
    "…To evaluate the AAOA, we implemented extensive experiments using twenty-three well-known benchmark functions and eight data clustering datasets. We also evaluated the proposed AAOA with extensive comparisons to different optimization algorithms. …"
  5. 5

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems حسب Hisham A. Kholidy (18891802)

    منشور في 2019
    "…This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce VHDRA, a Vertical and Horizontal Data Reduction Approach, to improve the classification accuracy and speed of the NNGE algorithm and reduce the computational resource consumption. …"
  6. 6
  7. 7
  8. 8

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm حسب Prabu Selvam (22330264)

    منشور في 2025
    "…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …"
  9. 9

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…Existing benchmark datasets are outdated and limited due to knowledge of specific job postings, which limits the existing models’ capability in detecting fraudulent jobs. …"
  10. 10

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
  11. 11

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …"
  12. 12

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. …"
  13. 13

    Large-scale annotation dataset for fetal head biometry in ultrasound images حسب Mahmood Alzubaidi (15740693)

    منشور في 2023
    "…<p>This dataset features a collection of 3832 high-resolution ultrasound images, each with dimensions of 959×661 pixels, focused on Fetal heads. …"
  14. 14

    K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation حسب Ashhadul Islam (16869981)

    منشور في 2022
    "…The KNNOR algorithm has outperformed the state-of-the-art augmentation algorithms by enabling classifiers to achieve much higher accuracy after injecting artificial minority datapoints into imbalanced datasets. …"
  15. 15

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
    احصل على النص الكامل
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20