Real-time advanced computational intelligence for deep fake video detection

N Bansal, T Aljrees, DP Yadav, KU Singh, A Kumar… - Applied Sciences, 2023 - mdpi.com
As digitization is increasing, threats to our data are also increasing at a faster pace.
Generating fake videos does not require any particular type of knowledge, hardware …

Detecting Outliers in Non-IID Data: A Systematic Literature Review

S Siddiqi, F Qureshi, S Lindstaedt, R Kern - IEEE Access, 2023 - ieeexplore.ieee.org
Outlier detection (outlier and anomaly are used interchangeably in this review) in non-
independent and identically distributed (non-IID) data refers to identifying unusual or …

[HTML][HTML] Hidden dangerous object recognition in terahertz images using deep learning methods

SA Danso, L Shang, D Hu, J Odoom, Q Liu… - Applied Sciences, 2022 - mdpi.com
As a harmless detection method, terahertz has become a new trend in security detection.
However, there are inherent problems such as the low quality of the images collected by …

[HTML][HTML] Anomaly detection using unsupervised machine learning algorithms: A simulation study

EF Agyemang - Scientific African, 2024 - Elsevier
This study presents a comprehensive evaluation of five prominent unsupervised machine
learning anomaly detection algorithms: One-Class Support Vector Machine (One-Class …

Replication-Based Query Management for Resource Allocation Using Hadoop and MapReduce over Big Data

A Kumar, N Varshney, S Bhatiya… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
We live in an age where everything around us is being created. Data generation rates are so
scary, creating pressure to implement costly and straightforward data storage and recovery …

Semantic and context understanding for sentiment analysis in Hindi handwritten character recognition using a multiresolution technique

A Kumar, S Bhatia, MR Khosravi, A Mashat… - ACM Transactions on …, 2024 - dl.acm.org
The rapid growth of Web 2.0, which enables people to generate, communicate, and share
information, has resulted in an increase in the total number of users. In develo** countries …

[HTML][HTML] Modeling a Sustainable Decision Support System for Banking Environments Using Rough Sets: A Case Study of the Egyptian Arab Land Bank

MA Elnagar, J Abdel Aty, AM Elhady… - International Journal of …, 2025 - mdpi.com
This study addresses the vast amount of information held by the banking sector, especially
regarding opportunities in tourism development, production, and large residential projects …

End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)

A Kumar, N Sharma, A Kumar - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
Wireless channels are used to link vehicles in a VANET. In these networks, there is no fixed
or static base station or any other kind of infrastructure support. An ad hoc network for mobile …

[PDF][PDF] Large dataset partitioning using ensemble partition-based clustering with majority voting technique

VD Babu, K Malathi - … Journal of Electrical Engineering and Computer …, 2023 - academia.edu
Large datasets have become useful in data mining for processing, storing, and handling vast
amounts of data. However, handling and processing large datasets is time-consuming and …

Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1

LJ Cwei, N Sahoo, G Srivastava, W Ding - ACM Transactions on …, 2021 - dl.acm.org
Data Mining is an analytic process to explore data in search of consistent patterns and/or
systematic relationships between variables, and then to validate the findings by applying the …