Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A novel meta-heuristic framework for solving power theft detection problem: Cheetah optimization algorithm
In this paper, a two-level stacking technique with feature selection is used to detect power
theft. The first level of this technique uses base classifiers such as support vector machine …
theft. The first level of this technique uses base classifiers such as support vector machine …
Application of machine learning algorithm in managing deviant consumer behaviors and enhancing public service.
S Dubey, P Salwan, NK Agarwal - Journal of Global Information …, 2021 - igi-global.com
Consumer-deviant behavior costs global utility firms USD 96 billion yearly, attributable to
Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading …
Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading …
Analysis of Public Interest in Telkomsel Cards Using the Decision Tree Method
PT Cantika, GJ Yanris… - Sinkron: jurnal dan …, 2023 - jurnal.polgan.ac.id
Abstract SIM card (Subscriber Identification Module) card is a physical electronic device that
is the integrated circuit of the internet. Sim cards are used by the public as a place to store …
is the integrated circuit of the internet. Sim cards are used by the public as a place to store …