Suggested Topics within your search.
Suggested Topics within your search.
- Libraries and electronic publishing 2
- Automobiles 1
- Bibliotheken 1
- Communication in rehabilitation 1
- Computer graphics 1
- Digital techniques 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic books 1
- Electronic information resources 1
- Elektronische boeken 1
- Fault location (Engineering) 1
- Image processing 1
- Language 1
- Law 1
- Libraries 1
- Maintenance and repair 1
- Management 1
- Medical rehabilitation 1
- Photography 1
- Rehabilitation 1
- Special collections 1
- Telecommunication in medicine 1
- Telemedicine 1
- methods 1
-
1
Fraud Detection on Crowdfunding Platforms Using Multiple Feature Selection Methods
Published 2025-01-01“…In order to identify and comprehend the distinguishing characteristics of fraudulent campaigns, we first propose 1) using a wide variety of characteristics of campaign projects and project creators, including their profiles, behavior, social traits, and language; then, 2) we propose to use and combine three well-known multiple feature selection methods, which are based on Correlation-based Feature Selection (CFS), Pearson Correlation Coefficient (PCC), and Information Gain (IG), to identify representative features of fraudulent campaigns. …”
Get full text
Article -
2
Detection of Selected Heavy Metal Ions Using Organic Chromofluorescent Chemosensors
Published 2025-03-01Get full text
Article -
3
Optimizing Feature Selection for IOT Intrusion Detection Using RFE and PSO
Published 2025-06-01“…RFE notably improved kNN and DT accuracy, while SVM showed consistent results regardless of the feature of selection. These results highlight the importance of feature selection in optimizing classifiers for IoT intrusion detection , and achieved perfect scores (1,00) across all metrics.The aim from this paper is to enhance intrusion detection in iot networks by designing adual stage feature selection method based on RFE and PSO.…”
Get full text
Article -
4
Detection of wheat, chickpea, and sea foam in black pepper using hyperspectral imaging technique
Published 2025-06-01“…After feature extraction, sequential feature selection method was used to find efficient features and then artificial neural network was used for classification and prediction. …”
Get full text
Article -
5
Detection of LUAD-Associated Genes Using Wasserstein Distance in Multiomics Feature Selection
Published 2025-06-01“…Using The Cancer Genome Atlas (TCGA) dataset, we integrated copy number alteration (CNA), mRNA expression, and DNA methylation data as predictors and applied our selected methods. …”
Get full text
Article -
6
EEG-Based Emotion Detection Using Roberts Similarity and PSO Feature Selection
Published 2025-01-01“…In this paper, a novel classifier based on Robert’s similarity measure is introduced for emotion detection using electroencephalogram (EEG) signals. …”
Get full text
Article -
7
Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques
Published 2025-01-01“…Subsequently, a methodology is proposed for detecting banking malware C&C communication traffic, and this methodology is tested using several feature selection algorithms to determine which feature selection algorithm performs the best. …”
Get full text
Article -
8
Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks
Published 2016-01-01“…This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. …”
Get full text
Article -
9
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
Published 2021-06-01“…The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. …”
Get full text
Article -
10
Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection
Published 2025-05-01“…Differential evolution is a population-based meta-heuristic technique which can be applied to nonlinear and non-differentiable optimization problems owing to its fast convergence and use of few control parameters. Apart from that, an ensemble learning algorithm is also employed to support and enhance the detection phase, providing a robust defense against the dynamic and sophisticated nature of modern P2P botnets. …”
Get full text
Article -
11
Improving Image Spam Detection Using a New Image Texture Features Selection
Published 2024-12-01“…The purpose of the research is to use image texture features to detect image spam. …”
Get full text
Article -
12
Enhanced schizophrenia detection using multichannel EEG and CAOA-RST-based feature selection
Published 2025-07-01“…In the feature extraction stage, feature selection is performed using CAOA. In addition, classification is performed using a Support Vector Machine (SVM) based on features extracted through Multivariate Empirical Mode Function (MEMF) and entropy measures. …”
Get full text
Article -
13
Enhanced Anomaly Detection in IoT Networks Using Deep Autoencoders with Feature Selection Techniques
Published 2025-05-01“…More specifically, we propose and implement a model that uses DAE (deep autoencoder) to detect and classify the network data, with an ANOVA F-Test for the feature selection. …”
Get full text
Article -
14
Selective Auditory Attention Detection Using Combined Transformer and Convolutional Graph Neural Networks
Published 2024-11-01“…Finally, the corresponding EEG features of active electrodes are fed into the graph attention layers to detect auditory attention. The Fuglsang 2020 dataset is used in the experiments to train and test the proposed and baseline systems. …”
Get full text
Article -
15
-
16
Intrusion detection system based on machine learning using least square support vector machine
Published 2025-04-01“…The hyperparameters of our model are tuned by utilizing those selected features to maximize the accuracy. The model developed is verified using three different datasets, which have been widely applied to intrusion detection. …”
Get full text
Article -
17
Rapid detection of illegal selective androgen receptor modulators in unregistered supplements using a combination of selected solid-state analytical methods
Published 2025-06-01“…For customs officers and police officers, minimal or no sample preparation before analysis is essential when detecting prohibited compounds/counterfeit products, ideally using on-site analysis. …”
Get full text
Article -
18
Selective protection of cereals using artificial neural networks
Published 2025-06-01Get full text
Article -
19
An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM
Published 2024-10-01“…Finally, combining the optimal threshold and loss function, we propose a model named MIX_LSTM for anomaly detection in IIoT. Experiments are conducted using the UNSW-NB15 and NSL-KDD datasets. …”
Get full text
Article -
20
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. The IDAOA serves as a wrapper-based feature selection method, optimizing the identification of the most impactful features while balancing local exploration and global exploitation. …”
Get full text
Article