Academic literature on the topic 'Data detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data detection"
P, Veeramuthu. "Analysis of Progressive Duplicate Data Detection." Journal of Computational Mathematica 3, no. 2 (December 30, 2019): 41–50. http://dx.doi.org/10.26524/cm53.
Full textBaidari, Dr Ishwar, and S. P. Sajjan. "Location Based Crime Detection Using Data Mining." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (October 31, 2016): 208–12. http://dx.doi.org/10.9756/bijsesc.8279.
Full textS., Geetha. "Big Data Analysis - Cybercrime Detection in Social Network." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (March 31, 2020): 147–52. http://dx.doi.org/10.5373/jardcs/v12sp4/20201476.
Full textSunjana and Azizah Zakiah. "Outlier Detection of Transaction Data Using DBSCAN Algorithm." International Journal of Psychosocial Rehabilitation 24, no. 02 (February 12, 2020): 3232–40. http://dx.doi.org/10.37200/ijpr/v24i2/pr200632.
Full textDener, Murat, Gökçe Ok, and Abdullah Orman. "Malware Detection Using Memory Analysis Data in Big Data Environment." Applied Sciences 12, no. 17 (August 27, 2022): 8604. http://dx.doi.org/10.3390/app12178604.
Full textDalvi, Mr Sagar Ravindra, and Ms Shamika Rajendra Khatu. "Data Leakage Detection." IARJSET 4, no. 4 (January 27, 2017): 164–66. http://dx.doi.org/10.17148/iarjset/nciarcse.2017.48.
Full textPapadimitriou, Panagiotis, and Hector Garcia-Molina. "Data Leakage Detection." IEEE Transactions on Knowledge and Data Engineering 23, no. 1 (January 2011): 51–63. http://dx.doi.org/10.1109/tkde.2010.100.
Full textSakr, Mohamed, Walid Atwa, and Arabi Keshk. "Genetic-based Summarization for Local Outlier Detection in Data Stream." International Journal of Intelligent Systems and Applications 13, no. 1 (February 8, 2021): 58–68. http://dx.doi.org/10.5815/ijisa.2021.01.05.
Full textManoj, V. V. R., V. Aditya Rama Narayana, and A. Bhargavi A. Lakshmi Prasanna Md Aakhila Bhanu. "Outlier Detection using Reverse Neares Neighbor for Unsupervised Data." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1511–13. http://dx.doi.org/10.31142/ijtsrd11406.
Full textS, Umadevi, and Nirmala Sugirtha Rajini S. "Detection of Traffic Violation Crime Using Data Mining Algorithms." Journal of Advanced Research in Dynamical and Control Systems 11, no. 0009-SPECIAL ISSUE (September 25, 2019): 982–87. http://dx.doi.org/10.5373/jardcs/v11/20192660.
Full textDissertations / Theses on the topic "Data detection"
Weis, Melanie. "Duplicate detection in XML data." Duisburg Köln WiKu, 2007. http://d-nb.info/987676849/04.
Full textCao, Lei. "Outlier Detection In Big Data." Digital WPI, 2016. https://digitalcommons.wpi.edu/etd-dissertations/82.
Full textAbghari, Shahrooz. "Data Modeling for Outlier Detection." Licentiate thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16580.
Full textScalable resource-efficient systems for big data analytics
Payne, Timothy Myles. "Remote detection using fused data /." Title page, abstract and table of contents only, 1994. http://web4.library.adelaide.edu.au/theses/09PH/09php3465.pdf.
Full textForstén, Andreas. "Unsupervised Anomaly Detection in Receipt Data." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215161.
Full textMed de framsteg inom datahantering och datorkraft som gjorts så kommer också möjligheten att automatisera uppgifter som ej nödvändigtvis utförs av människor. Denna studie gjordes i samarbete med ett företag som digitaliserar företags kvitton. Vi undersöker möjligheten att automatisera sökandet av avvikande kvittodata, vilket kan avlasta revisorer. Vti studerar både avvikande användarbeteenden och individuella kvitton. Resultaten indikerar att automatisering är möjligt, vilket kan reducera behovet av mänsklig inspektion av kvitton
Tian, Xuwen, and 田旭文. "Data-driven textile flaw detection methods." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hdl.handle.net/10722/196091.
Full textpublished_or_final_version
Industrial and Manufacturing Systems Engineering
Doctoral
Doctor of Philosophy
Siddiqui, Muazzam. "DATA MINING METHODS FOR MALWARE DETECTION." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2783.
Full textPh.D.
Other
Sciences
Modeling and Simulation PhD
Mohd, Ali Azliza. "Anomalous behaviour detection using heterogeneous data." Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/125026/.
Full textPellissier, Muriel. "Anomaly detection technique for sequential data." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM078/document.
Full textNowadays, huge quantities of data can be easily accessible, but all these data are not useful if we do not know how to process them efficiently and how to extract easily relevant information from a large quantity of data. The anomaly detection techniques are used in many domains in order to help to process the data in an automated way. The anomaly detection techniques depend on the application domain, on the type of data, and on the type of anomaly.For this study we are interested only in sequential data. A sequence is an ordered list of items, also called events. Identifying irregularities in sequential data is essential for many application domains like DNA sequences, system calls, user commands, banking transactions etc.This thesis presents a new approach for identifying and analyzing irregularities in sequential data. This anomaly detection technique can detect anomalies in sequential data where the order of the items in the sequences is important. Moreover, our technique does not consider only the order of the events, but also the position of the events within the sequences. The sequences are spotted as anomalous if a sequence is quasi-identical to a usual behavior which means if the sequence is slightly different from a frequent (common) sequence. The differences between two sequences are based on the order of the events and their position in the sequence.In this thesis we applied this technique to the maritime surveillance, but this technique can be used by any other domains that use sequential data. For the maritime surveillance, some automated tools are needed in order to facilitate the targeting of suspicious containers that is performed by the customs. Indeed, nowadays 90% of the world trade is transported by containers and only 1-2% of the containers can be physically checked because of the high financial cost and the high human resources needed to control a container. As the number of containers travelling every day all around the world is really important, it is necessary to control the containers in order to avoid illegal activities like fraud, quota-related, illegal products, hidden activities, drug smuggling or arm smuggling. For the maritime domain, we can use this technique to identify suspicious containers by comparing the container trips from the data set with itineraries that are known to be normal (common). A container trip, also called itinerary, is an ordered list of actions that are done on containers at specific geographical positions. The different actions are: loading, transshipment, and discharging. For each action that is done on a container, we know the container ID and its geographical position (port ID).This technique is divided into two parts. The first part is to detect the common (most frequent) sequences of the data set. The second part is to identify those sequences that are slightly different from the common sequences using a distance-based method in order to classify a given sequence as normal or suspicious. The distance is calculated using a method that combines quantitative and qualitative differences between two sequences
Al-Bataineh, Hussien Suleiman. "Islanding Detection Using Data Mining Techniques." Thesis, North Dakota State University, 2015. https://hdl.handle.net/10365/27634.
Full textBooks on the topic "Data detection"
Varshney, Pramod K. Distributed Detection and Data Fusion. New York, NY: Springer New York, 1997.
Find full textGupta, Manish, Jing Gao, Charu Aggarwal, and Jiawei Han. Outlier Detection for Temporal Data. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-01905-0.
Full textVarshney, Pramod K. Distributed Detection and Data Fusion. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-1904-0.
Full textVarshney, Pramod K. Distributed detection and data fusion. Edited by Burrus C. S. Berlin: Springer, 1996.
Find full textVarshney, Pramod K. Distributed detection and data fusion. Edited by Burrus C. S. New York: Springer, 1997.
Find full textSamy, Ihab, and Da-Wei Gu. Fault Detection and Flight Data Measurement. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24052-2.
Full textLatifur, Khan, and Thuraisingham Bhavani M, eds. Data mining tools for malware detection. Boca Raton, FL: CRC Press, 2012.
Find full textYang, Chenggang. Precipitation detection with satellite microwave data. Washington, D.C: U.S. Dept. of Commerce, National Oceanic and Atmospheric Administration, National Environmental Satellite, Data, and Information Service, 1988.
Find full textChen, Zhiwen. Data-Driven Fault Detection for Industrial Processes. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-16756-1.
Full textM, Breipohl Arthur, ed. Random signals: Detection, estimation, and data analysis. New York: Wiley, 1988.
Find full textBook chapters on the topic "Data detection"
Sengupta, Nandita, and Jaya Sil. "Data Reduction." In Intrusion Detection, 47–82. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_3.
Full textBatarseh, Feras A. "Anomaly Detection." In Encyclopedia of Big Data, 25–27. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-32010-6_223.
Full textBatarseh, Feras A. "Anomaly Detection." In Encyclopedia of Big Data, 1–3. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_223-1.
Full textBoroojeni, Kianoosh G., M. Hadi Amini, and S. S. Iyengar. "Bad Data Detection." In Smart Grids: Security and Privacy Issues, 53–68. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45050-6_4.
Full textFalsafi, Babak, Samuel Midkiff, JackB Dennis, JackB Dennis, Amol Ghoting, Roy H. Campbell, Christof Klausecker, et al. "Data Race Detection." In Encyclopedia of Parallel Computing, 524. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-09766-4_2248.
Full textChen, Dewang, and Ruijun Cheng. "Error Data Detection." In Intelligent Processing Algorithms and Applications for GPS Positioning Data of Qinghai-Tibet Railway, 87–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58970-0_5.
Full textBertino, Elisa. "Anomaly Detection." In Data Protection from Insider Threats, 37–45. Cham: Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-01890-9_4.
Full textDissertori, Günther. "Data Analysis." In Handbook of Particle Detection and Imaging, 83–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-13271-1_4.
Full textDissertori, Günther. "Data Analysis." In Handbook of Particle Detection and Imaging, 1–25. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-47999-6_4-2.
Full textDissertori, Günther. "Data Analysis." In Handbook of Particle Detection and Imaging, 91–116. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-93785-4_4.
Full textConference papers on the topic "Data detection"
Peng, Chubing, M. Mansuripur, Kenichi Nagata, and Takeo Ohta. "Edge detection readout signal and cross-talk in phase-change optical data storage." In Optical Data Storage. Washington, D.C.: Optica Publishing Group, 1998. http://dx.doi.org/10.1364/ods.1998.tub.3.
Full textMilster, Tom D., and Robert S. Upton. "Complex Plane Description of Differential Phase Detection in Optical Data Storage." In Optical Data Storage. Washington, D.C.: Optica Publishing Group, 1998. http://dx.doi.org/10.1364/ods.1998.pdp.9.
Full textChernyavsky, Irina, Aparna S. Varde, and Simon Razniewski. "CSK-Detector: Commonsense in object detection." In 2022 IEEE International Conference on Big Data (Big Data). IEEE, 2022. http://dx.doi.org/10.1109/bigdata55660.2022.10020915.
Full textPham, Vung, Chau Pham, and Tommy Dang. "Road Damage Detection and Classification with Detectron2 and Faster R-CNN." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9378027.
Full textDutta, Nishan, and M. Indumathy. "Sign Language Detection Using Action Recognition." In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-oswg04.
Full textWang, Yanbo J., Ming Ding, Shichao Kan, Shifeng Zhang, and Chenyue Lu. "Deep Proposal and Detection Networks for Road Damage Detection and Classification." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622599.
Full textLjevar, Vanja, James Goulding, Alexa Spence, and Gavin Smith. "Perception detection using Twitter." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9378293.
Full textPalsetia, Diana, Md Mostofa Ali Patwary, William Hendrix, Ankit Agrawal, and Alok Choudhary. "Clique guided community detection." In 2014 IEEE International Conference on Big Data (Big Data). IEEE, 2014. http://dx.doi.org/10.1109/bigdata.2014.7004267.
Full textZhang, Wenshan, and Xi Zhang. "Cross-Lingual Propaganda Detection." In 2022 IEEE International Conference on Big Data (Big Data). IEEE, 2022. http://dx.doi.org/10.1109/bigdata55660.2022.10021059.
Full textEslami, Mohammed, George Zheng, Hamed Eramian, and Georgiy Levchuk. "Anomaly detection on bipartite graphs for cyber situational awareness and threat detection." In 2017 IEEE International Conference on Big Data (Big Data). IEEE, 2017. http://dx.doi.org/10.1109/bigdata.2017.8258527.
Full textReports on the topic "Data detection"
Anderson-Cook, Christine, Dan Archer, Mark Bandstra, Joseph Curtis, James Ghawaly, Tenzing Joshi, Kary Myers, Andrew Nicholson, and Brian Quiter. Radiation Detection Data Competition Report. Office of Scientific and Technical Information (OSTI), April 2021. http://dx.doi.org/10.2172/1778748.
Full textLee, Wenke, and Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection. Fort Belvoir, VA: Defense Technical Information Center, October 2000. http://dx.doi.org/10.21236/ada401496.
Full textVarshney, Pramod K. Distributed Detection Theory and Data Fusion. Fort Belvoir, VA: Defense Technical Information Center, December 1999. http://dx.doi.org/10.21236/ada374837.
Full textVarshney, Pramod K. Distributed Detection Theory and Data Fusion. Fort Belvoir, VA: Defense Technical Information Center, March 1994. http://dx.doi.org/10.21236/ada280410.
Full textVarshney, Pramod K. Distributed Detection Theory and Data Fusion. Fort Belvoir, VA: Defense Technical Information Center, July 1995. http://dx.doi.org/10.21236/ada301116.
Full textWegman, Edward J., and Don R. Faxon. Intrusion Detection Using Data Mining Techniques. Fort Belvoir, VA: Defense Technical Information Center, January 2004. http://dx.doi.org/10.21236/ada421061.
Full textWilliams, A. Trace Chemical Mine Detection Data Collection. Fort Belvoir, VA: Defense Technical Information Center, September 2003. http://dx.doi.org/10.21236/ada462212.
Full textWidder, Edith A., and Charles L. Frey. Bioluminescence Truth Data Measurement and Signature Detection. Fort Belvoir, VA: Defense Technical Information Center, September 2007. http://dx.doi.org/10.21236/ada549795.
Full textTouzi, R. Calibrated Polarimetric SAR Data for Ship Detection. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2000. http://dx.doi.org/10.4095/219697.
Full textDamiano, B., E. D. Blakeman, and L. D. Phillips. Detection and location of mechanical system degradation by using detector signal noise data. Office of Scientific and Technical Information (OSTI), June 1994. http://dx.doi.org/10.2172/10158070.
Full text