Search Results - (( data distribution detection algorithm ) OR ( peer evaluation model algorithm ))
Search alternatives:
- distribution detection »
- data distribution »
- peer evaluation »
- model algorithm »
-
1
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
Get full text
Get full text
Get full text
Article -
2
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…Among many, the ratio algorithm is one of the approaches in remote sensing used to detect chlorophyll-a in the phytoplankton for its distribution and monitoring. …”
Get full text
Get full text
Get full text
Article -
3
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
4
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The system is simulated using EPANET (Environmental Prediction Agency Network) software based on actual water distribution system (WDS) data from Benghazi city, Libya. …”
Get full text
Get full text
Thesis -
5
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Withal, the large amount of high dimensional data might influence detection effectiveness and raise the computation requirements. …”
Get full text
Get full text
Article -
6
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. …”
Get full text
Get full text
Get full text
Thesis -
7
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
8
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…This indicates that LiDAR data are highly efficient in detecting landslide characteristics in tropical forested areas. …”
Get full text
Get full text
Get full text
Thesis -
10
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…In order to reduce the training time and computational cost of the algorithm, Principal Components Analysis (PCA) pretraining strategy is deployed to obtain data adaptive filter banks. …”
Get full text
Get full text
Get full text
Thesis -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article
