Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A machine learning-based intrusion detection for detecting internet of things network attacks
Abstract The Internet of Things (IoT) refers to the collection of all those devices that could
connect to the Internet to collect and share data. The introduction of varied devices …
connect to the Internet to collect and share data. The introduction of varied devices …
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in …
The cyber-physical system (CPS) plays a crucial role in supporting critical infrastructure like
water treatment facilities, gas stations, air conditioning components, and smart grids, which …
water treatment facilities, gas stations, air conditioning components, and smart grids, which …
Microarray gene expression data classification via Wilcoxon sign rank sum and novel Grey Wolf optimized ensemble learning models
Cancer is a deadly disease that affects the lives of people all over the world. Finding a few
genes relevant to a single cancer disease can lead to effective treatments. The difficulty with …
genes relevant to a single cancer disease can lead to effective treatments. The difficulty with …
Risks of AI-assisted learning on student critical thinking: a case study of Albania
E Çela, MM Fonkam, RM Potluri - International Journal of Risk and …, 2024 - igi-global.com
Artificial Intelligence (AI) has increasingly become a transformative force in the education
sector, offering unprecedented opportunities to enhance learning experiences and …
sector, offering unprecedented opportunities to enhance learning experiences and …
Effective dimensionality reduction model with machine learning classification for microarray gene expression data
YK Saheed - Data science for genomics, 2023 - Elsevier
Microarray technology enables biologists to simultaneously monitor the activities of genome-
wide features. This method generates gene expression data that can be used to classify …
wide features. This method generates gene expression data that can be used to classify …
[PDF][PDF] An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system
Intrusion Detection System (IDS) is a challenging cyberspace security technology to
safeguard against a malicious threat. Although many soft computing approaches have been …
safeguard against a malicious threat. Although many soft computing approaches have been …
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats
Ensuring strong security measures against intrusions is of utmost importance in the ever-
changing field of information management systems. Conventional Intrusion Detection …
changing field of information management systems. Conventional Intrusion Detection …
[PDF][PDF] Cross project software defect prediction using machine learning: a review
MS Saeed, M Saleem - International Journal of Computational …, 2023 - researchgate.net
Software defect prediction is a crucial area of study focused on enhancing software quality
and cutting down on software upkeep expenses. Cross Project Defect Prediction (CPDP) is …
and cutting down on software upkeep expenses. Cross Project Defect Prediction (CPDP) is …
An empirical comparison of model-agnostic techniques for defect prediction models
Recently, software defect prediction studies have attempted to make black-box defect
prediction models explainable and actionable. State-of-the-art defect prediction studies have …
prediction models explainable and actionable. State-of-the-art defect prediction studies have …
Software defects prediction at method level using ensemble learning techniques
AM Ibrahim, H Abdelsalam… - International Journal of …, 2023 - journals.ekb.eg
Creating error-free software artifacts is essential to increase software quality and potential re-
usability. However, testing software artifacts to find defects and fix them is time-consuming …
usability. However, testing software artifacts to find defects and fix them is time-consuming …