Showing 981 - 1,000 results of 8,230 for search 'Optimal detection methods', query time: 0.22s Refine Results
  1. 981
  2. 982

    Optimization of GC-MS Method for Analysis of Basil Essential Oils from Algeria: Design of Experiments and Exploratory Pattern Recognition by Nabila Slougui, Meriem Slama, Yasser Boudaoud, Aymene Salah Bendrihem

    Published 2022-01-01
    “…This set of conditions was later used for the optimization of the final method. The optimal experimental conditions were subsequently obtained by response surface optimization (isotherm duration = 6.2 min and slope = 1.06°C/min). …”
    Get full text
    Article
  3. 983

    Node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network by Zhanjun Hao, Nanjiang Qu, Xiaochao Dang, Jiaojiao Hou

    Published 2019-08-01
    “…For this reason, a node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network is proposed in this article. …”
    Get full text
    Article
  4. 984
  5. 985
  6. 986
  7. 987

    Efficient sepsis detection using deep learning and residual convolutional networks by Ahmed S. Almasoud, Ghada Moh Samir Elhessewi, Munya A. Arasi, Abdulsamad Ebrahim Yahya, Menwa Alshammeri, Donia Badawood, Faisal Mohammed Nafie, Mohammed Assiri

    Published 2025-07-01
    “…In this article, we present a new deep learning model to detect the occurrence of sepsis and the African vulture optimization algorithm (AVOA) to enhance the model performance. …”
    Get full text
    Article
  8. 988

    Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments by Pardis Sadatian Moghaddam, Ali Vaziri, Sarvenaz Sadat Khatami, Francisco Hernando-Gallego, Diego Martín

    Published 2025-06-01
    “…Traditional detection methods often fall short in identifying multi-class attacks, particularly in the presence of high-dimensional and imbalanced IoT traffic. …”
    Get full text
    Article
  9. 989
  10. 990

    Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection by Nwamaka Georgenia Ezeji, Kingsley Ifeanyi Chibueze, Nnenna Harmony Nwobodo-Nzeribe

    Published 2024-09-01
    “… Electricity theft is a significant challenge for utility companies worldwide, leading to substantial economic losses and inefficiencies in power distribution. Traditional methods of detecting electricity theft, such as manual inspections and routine audits, are often inefficient and ineffective. …”
    Get full text
    Article
  11. 991

    Artificial Afterimage Algorithm: A New Bio-Inspired Metaheuristic Algorithm and Its Clustering Application by Murat Demir

    Published 2025-01-01
    “…Metaheuristic methods are optimization methods that look for different ways to converge to a solution to a problem where it is difficult to find a solution analytically. …”
    Get full text
    Article
  12. 992

    The optimization path of agricultural industry structure and intelligent transformation by deep learning by Xingchen Pan, Jinyu Chen

    Published 2024-11-01
    “…Subsequently, a hybrid optimization method is designed, combining the Genetic Algorithms with particle swarm optimization to improve the model’s global search capability and local convergence speed. …”
    Get full text
    Article
  13. 993
  14. 994

    EEG-Based Emotion Detection Using Roberts Similarity and PSO Feature Selection by Mustafa Hussein Mohammed, Mustafa Noaman Kadhim, Dhiah Al-Shammary, Ayman Ibaida

    Published 2025-01-01
    “…Evaluation on an EEG brainwave dataset demonstrated that the method achieved an accuracy of 98.75% with feature selection, compared to 94.04% without it in emotional state detection. …”
    Get full text
    Article
  15. 995

    Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles by Naif Almakayeel

    Published 2024-10-01
    “…To efficiently counter new malware variants, novel techniques distinct from conventional methods must be utilized. Machine learning (ML) techniques cannot detect every new and complex malware variant. …”
    Get full text
    Article
  16. 996

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…The ACAD-BMDL method mainly focuses on enhancing security in the CPS environment via the cyberattack detection process. …”
    Get full text
    Article
  17. 997

    An Improved DoH Traffic Classification Method for XGboost by LI Bo, WEN Xueyan, XU Kesheng, ZHAO Yonghui

    Published 2023-02-01
    “… Encrypted traffic has become the main traffic in the Internet, and its classification has always been one of the research hotspots.Aiming at the problems of accurate identification of DoH(DNS-over-HTTPS) traffic in the current network, slow processing speed and low detection efficiency, a dimension reduction method based on truncated singular value decomposition (TSVD) is proposed.Improved limit gradient boosting tree (IXGboost) with Bayesian optimization method for DoH Flow classification.This method classifies encrypted traffic into non-DOH traffic, benign DoH traffic and malicious DoH traffic by exposing data sets over the network.Experimental results show that the classification accuracy of the proposed method is more than 99%, and the processing time of each data is only 0.3ms, which proves that the proposed method has high accuracy and strong real-time performance, improves the performance of intrusion detection, and can effectively achieve accurate classification of DoH traffic.…”
    Get full text
    Article
  18. 998

    Optimizing Biometric Security in Industry 4.0 A Critical Analysis of Authentication Parameters and Their Impacts Using Multi-Criteria Methods by Javier Andres Esquivias Varela

    Published 2025-07-01
    “…TOPSIS and MORA decision-making frameworks were applied to determine the optimal biometric system. The results indicate that facial detection offers the highest accuracy (98%) and the lowest energy consumption (64% less than Retina recognition), although its performance is affected by lighting conditions. …”
    Get full text
    Article
  19. 999
  20. 1000

    Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments by G. Nalinipriya, S. Rama Sree, K. Radhika, E. Laxmi Lydia, Faten Khalid Karim, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-07-01
    “…Machine learning (ML) plays a crucial role in cybersecurity by making malware detection more scalable, efficient, and automated, reducing reliance on conventional human intervention methods. …”
    Get full text
    Article