Search Results - (( data detection method algorithm ) OR ( data validation using algorithm ))
Search alternatives:
- method algorithm »
- validation using »
- data validation »
- using algorithm »
- data detection »
-
1
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
4
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
5
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The data source used as training data comes from the official Kaggle website, the data used in this study is data on the spread of the coronavirus collected from 2020 to 2021 with a total of 20,816 training data. …”
Get full text
Get full text
Book Section -
6
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Experimental work was conducted to obtain PD data on both ultrasonic and electrical methods. The validated PD data acquired from ultrasonic method was used to test SPDI and compared with several models of NN. …”
Get full text
Get full text
Thesis -
7
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
Get full text
Get full text
Thesis -
8
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
Get full text
Get full text
Get full text
Thesis -
9
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011“…Moreover, the experiment has two phases training and testing , in the first phase, the machine learnt from training dataset, meanwhile, the detector detected the missing data and replace any missing data with the correct attribute according to the validity method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. The main idea in these algorithms is using density-based methods in the clustering process and at the same time overcoming the constraints, which are put out by data stream’s nature. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…A 20-fold cross-validation was used to validate the score metrics. Almost all the algorithms score 85% and above in terms of accuracy, precision and recall…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
14
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…Automatic diagnostic methods were frequently used to conduct breast cancer diagnoses in order to increase the accuracy and speed of detection. …”
Get full text
Get full text
Get full text
Article -
15
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
16
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The data for model training and validation are generated using semi-empirical models developed by the authors. …”
Get full text
Conference or Workshop Item -
17
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…There are four major steps in a background subtraction algorithm, which are pre-processing, background modeling, foreground detection, and data validation. …”
Get full text
Get full text
Research Reports -
18
Identifying communities with modularity metric using Louvain and Leiden algorithms
Published 2024“…Among them, the optimisation methods are widely focused on. This paper focuses on an empirical study of two community detection algorithms based on agglomerative techniques using modularity metric: Louvain and Leiden. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…In contrast, March algorithms with lower complexity can be used to reduce test costs and chip area overhead. …”
Get full text
Get full text
Get full text
Article -
20
Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm
Published 2025“…The model is trained using the Czech data in Road Damage Dataset RDD2022 from the Crowdsensing-based Road Damage Detection Challenge (CRDDC’2022), with 80% of the data used for training and 20% for validation. …”
Get full text
Get full text
Get full text
Article
