Showing 381 - 400 results of 3,033 for search 'data detection learning algorithm', query time: 0.27s Refine Results
  1. 381
  2. 382

    Vision-based approach to knee osteoarthritis and Parkinson’s disease detection utilizing human gait patterns by Zeeshan Ali, Jihoon Moon, Saira Gillani, Sitara Afzal, Muazzam Maqsood, Seungmin Rho

    Published 2025-05-01
    “…Several researchers proposed different methods in this area, including gait detection utilizing sensor-based data and vision-based systems that include both marker-based and marker-free techniques. …”
    Get full text
    Article
  3. 383

    Dual-hybrid intrusion detection system to detect False Data Injection in smart grids. by Saad Hammood Mohammed, Mandeep S Jit Singh, Abdulmajeed Al-Jumaily, Mohammad Tariqul Islam, Md Shabiul Islam, Abdulmajeed M Alenezi, Mohamed S Soliman

    Published 2025-01-01
    “…Future research should focus on integrating real-world smart grid data for validation, developing adaptive learning mechanisms, exploring other bio-inspired optimization algorithms, and addressing real-time processing and scalability challenges in large-scale deployments.…”
    Get full text
    Article
  4. 384
  5. 385
  6. 386
  7. 387
  8. 388
  9. 389

    Generalizability of machine learning models for diabetes detection a study with nordic islet transplant and PIMA datasets by Dinesh Chellappan, Harikumar Rajaguru

    Published 2025-02-01
    “…Abstract Diabetes Mellitus (DM) is a global health challenge, and accurate early detection is critical for effective management. The study explores the potential of machine learning for improved diabetes prediction using microarray gene expression data and PIMA data set. …”
    Get full text
    Article
  10. 390

    Using deep learning for detecting BotCloud by Guang KOU, Guang-ming TANG, Shuo WANG, Hai-tao SONG, Yuan BIAN

    Published 2016-11-01
    “…Finally, in order to detect BotCloud, it utilized CNN algorithm to learn and extract characteristics that were more abstract to express the hidden model and structural relationship in the network data flow. …”
    Get full text
    Article
  11. 391

    Cluster Workload Allocation: A Predictive Approach Leveraging Machine Learning Efficiency by Leszek Sliwko

    Published 2024-01-01
    “…This research investigates how Machine Learning (ML) algorithms can assist in workload allocation strategies by detecting tasks with node affinity operators (referred to as constraint operators), which constrain their execution to a limited number of nodes. …”
    Get full text
    Article
  12. 392
  13. 393

    Deep Learning-Based Atmospheric Visibility Detection by Yawei Qu, Yuxin Fang, Shengxuan Ji, Cheng Yuan, Hao Wu, Shengbo Zhu, Haoran Qin, Fan Que

    Published 2024-11-01
    “…With advancements in data science and computing, deep learning-based visibility detection technologies have rapidly emerged as a research hotspot in atmospheric science. …”
    Get full text
    Article
  14. 394

    Tackling the Optimal Phasor Measurement Unit Placement and Attack Detection Problems in Smart Grids by Incorporating Machine Learning by Ramzi Al-Sharawi, Abdelfatah Ali, Mostafa Shaaban, Nasser Qaddoumi, Mohamed S. Abdalzaher

    Published 2025-01-01
    “…Existing research primarily addresses cybersecurity by focusing on the optimal placement of phasor measurement units (PMUs) to ensure topological observability and minimize system costs, followed by developing AI-based attack detection algorithms. However, these studies fail to simultaneously consider system cost, loss in system observability, and false data injection attack (FDIA) detection performance. …”
    Get full text
    Article
  15. 395
  16. 396

    Image Data Augmentation Approaches: A Comprehensive Survey and Future Directions by Teerath Kumar, Rob Brennan, Alessandra Mileo, Malika Bendechache

    Published 2024-01-01
    “…Deep learning algorithms have exhibited impressive performance across various computer vision tasks; however, the challenge of overfitting persists, especially when dealing with limited labeled data. …”
    Get full text
    Article
  17. 397

    Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm by Jawhara Aljabri

    Published 2025-04-01
    “…Therefore, identifying numerous anomalies or cyberattacks in a network and constructing an effectual intrusion detection system (IDS) becomes more significant. Artificial intelligence (AI), mostly machine learning (ML) and deep learning (DL), has been employed to construct a data-driven intelligent IDS. …”
    Get full text
    Article
  18. 398

    A Scoring Algorithm for the Early Prediction of Academic Risk in STEM Courses by Vanja Čotić Poturić, Sanja Čandrlić, Ivan Dražić

    Published 2025-03-01
    “…Educational data mining (EDM) and learning analytics (LA) are widely applied to predict student performance, particularly in determining academic success or failure. …”
    Get full text
    Article
  19. 399

    A data-efficient deep transfer learning framework for methane super-emitter detection in oil and gas fields using the Sentinel-2 satellite by S. Zhao, S. Zhao, Y. Zhang, Y. Zhang, S. Zhao, S. Zhao, X. Wang, X. Wang, D. J. Varon

    Published 2025-04-01
    “…Here, we propose a novel deep-transfer-learning-based methane plume detection framework. It consists of two components: an adaptive artifact removal algorithm (low-reflectance artifact detection, LRAD) to reduce artifacts in methane retrievals and a deep subdomain adaptation network (DSAN) to detect methane plumes. …”
    Get full text
    Article
  20. 400

    Detection of network anomaly based on hybrid intelligence techniques by Shahbaa Khaleel, Karam mahdi saleh

    Published 2012-12-01
    “…The first method implemented by applying traditional clustering algorithm of KM in a way Kmeans on KDDcup99 data to detect attacks, in the way the second hybrid clustering algorithm HCA method was used where the Kmeans been hybridized with GA. …”
    Get full text
    Article