Search Results - (( based detection method algorithm ) OR ( data (replication OR implication) based algorithm ))
Search alternatives:
- method algorithm »
- based detection »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
A hybrid deep learning-based unsupervised anomaly detection in high dimensional data
Published 2022“…Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. …”
Get full text
Get full text
Article -
3
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…Grid search method was adopted to optimise the hyperparameters of the investigated base models. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
5
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
Get full text
Get full text
Thesis -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
7
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
8
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
Get full text
Get full text
Article -
9
An efficient unknown detection approach for RFID data stream management system
Published 2025“…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
10
-
11
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Most existing methods deal with the detection of an action after its completion. …”
Get full text
Get full text
Thesis -
12
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
13
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
14
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud
Published 2024“…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
Get full text
Get full text
Get full text
Article -
15
An adaptive data replication and placement for efficient data storage of online social networks using two-tier multi-cloud environment
Published 2022“…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
Get full text
Get full text
Article -
16
Oil palm USB (Unstripped Bunch) detector trained on synthetic images generated by PGGAN
Published 2023“…Specifically, we leverage the Faster R-CNN (Region-based Convolution Neural Network), a robust object detection algorithm, and complement it with Progressive Growing Generative Adversarial Networks (PGGAN) for synthetic image generation. …”
Get full text
Get full text
Get full text
Article -
17
Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS
Published 2019“…The proposed BANN model achieved the best training accuracies of (95%) and best prediction accuracies of (92%) based on testing data compared to other employed methods. …”
Get full text
Get full text
Thesis -
18
Dynamic replication algorithm in data grid: Survey
Published 2008“…A dynamic replication model based on mathematical concepts is proposed. …”
Get full text
Get full text
Get full text
Book Section -
19
Development of gesture-controlled robotic arm for upper limb hemiplegia therapy
Published 2022“…Many engineering challenges are addressed to develop a viable system for the therapy application: a real-time and accurate system for hand movement detection, limitation of robot workspace and hand-robot coordination, and development of hand motion-based robot position algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The use of three to five transactions is in NRG the data will be replicated into three to five sites. …”
Get full text
Get full text
Thesis
