Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Real-time advanced computational intelligence for deep fake video detection
As digitization is increasing, threats to our data are also increasing at a faster pace.
Generating fake videos does not require any particular type of knowledge, hardware …
Generating fake videos does not require any particular type of knowledge, hardware …
Detecting Outliers in Non-IID Data: A Systematic Literature Review
Outlier detection (outlier and anomaly are used interchangeably in this review) in non-
independent and identically distributed (non-IID) data refers to identifying unusual or …
independent and identically distributed (non-IID) data refers to identifying unusual or …
[HTML][HTML] Hidden dangerous object recognition in terahertz images using deep learning methods
As a harmless detection method, terahertz has become a new trend in security detection.
However, there are inherent problems such as the low quality of the images collected by …
However, there are inherent problems such as the low quality of the images collected by …
[HTML][HTML] Anomaly detection using unsupervised machine learning algorithms: A simulation study
EF Agyemang - Scientific African, 2024 - Elsevier
This study presents a comprehensive evaluation of five prominent unsupervised machine
learning anomaly detection algorithms: One-Class Support Vector Machine (One-Class …
learning anomaly detection algorithms: One-Class Support Vector Machine (One-Class …
Replication-Based Query Management for Resource Allocation Using Hadoop and MapReduce over Big Data
We live in an age where everything around us is being created. Data generation rates are so
scary, creating pressure to implement costly and straightforward data storage and recovery …
scary, creating pressure to implement costly and straightforward data storage and recovery …
Semantic and context understanding for sentiment analysis in Hindi handwritten character recognition using a multiresolution technique
The rapid growth of Web 2.0, which enables people to generate, communicate, and share
information, has resulted in an increase in the total number of users. In develo** countries …
information, has resulted in an increase in the total number of users. In develo** countries …
[HTML][HTML] Modeling a Sustainable Decision Support System for Banking Environments Using Rough Sets: A Case Study of the Egyptian Arab Land Bank
MA Elnagar, J Abdel Aty, AM Elhady… - International Journal of …, 2025 - mdpi.com
This study addresses the vast amount of information held by the banking sector, especially
regarding opportunities in tourism development, production, and large residential projects …
regarding opportunities in tourism development, production, and large residential projects …
End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
Wireless channels are used to link vehicles in a VANET. In these networks, there is no fixed
or static base station or any other kind of infrastructure support. An ad hoc network for mobile …
or static base station or any other kind of infrastructure support. An ad hoc network for mobile …
[PDF][PDF] Large dataset partitioning using ensemble partition-based clustering with majority voting technique
Large datasets have become useful in data mining for processing, storing, and handling vast
amounts of data. However, handling and processing large datasets is time-consuming and …
amounts of data. However, handling and processing large datasets is time-consuming and …
Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1
Data Mining is an analytic process to explore data in search of consistent patterns and/or
systematic relationships between variables, and then to validate the findings by applying the …
systematic relationships between variables, and then to validate the findings by applying the …