Journal articles on the topic 'Data detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
P, Veeramuthu. "Analysis of Progressive Duplicate Data Detection." Journal of Computational Mathematica 3, no. 2 (December 30, 2019): 41–50. http://dx.doi.org/10.26524/cm53.
Full textBaidari, Dr Ishwar, and S. P. Sajjan. "Location Based Crime Detection Using Data Mining." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (October 31, 2016): 208–12. http://dx.doi.org/10.9756/bijsesc.8279.
Full textS., Geetha. "Big Data Analysis - Cybercrime Detection in Social Network." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (March 31, 2020): 147–52. http://dx.doi.org/10.5373/jardcs/v12sp4/20201476.
Full textSunjana and Azizah Zakiah. "Outlier Detection of Transaction Data Using DBSCAN Algorithm." International Journal of Psychosocial Rehabilitation 24, no. 02 (February 12, 2020): 3232–40. http://dx.doi.org/10.37200/ijpr/v24i2/pr200632.
Full textDener, Murat, Gökçe Ok, and Abdullah Orman. "Malware Detection Using Memory Analysis Data in Big Data Environment." Applied Sciences 12, no. 17 (August 27, 2022): 8604. http://dx.doi.org/10.3390/app12178604.
Full textDalvi, Mr Sagar Ravindra, and Ms Shamika Rajendra Khatu. "Data Leakage Detection." IARJSET 4, no. 4 (January 27, 2017): 164–66. http://dx.doi.org/10.17148/iarjset/nciarcse.2017.48.
Full textPapadimitriou, Panagiotis, and Hector Garcia-Molina. "Data Leakage Detection." IEEE Transactions on Knowledge and Data Engineering 23, no. 1 (January 2011): 51–63. http://dx.doi.org/10.1109/tkde.2010.100.
Full textSakr, Mohamed, Walid Atwa, and Arabi Keshk. "Genetic-based Summarization for Local Outlier Detection in Data Stream." International Journal of Intelligent Systems and Applications 13, no. 1 (February 8, 2021): 58–68. http://dx.doi.org/10.5815/ijisa.2021.01.05.
Full textManoj, V. V. R., V. Aditya Rama Narayana, and A. Bhargavi A. Lakshmi Prasanna Md Aakhila Bhanu. "Outlier Detection using Reverse Neares Neighbor for Unsupervised Data." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1511–13. http://dx.doi.org/10.31142/ijtsrd11406.
Full textS, Umadevi, and Nirmala Sugirtha Rajini S. "Detection of Traffic Violation Crime Using Data Mining Algorithms." Journal of Advanced Research in Dynamical and Control Systems 11, no. 0009-SPECIAL ISSUE (September 25, 2019): 982–87. http://dx.doi.org/10.5373/jardcs/v11/20192660.
Full textMishra, Suchismita, Srikant Pattnaik, and Bibhuti Bhusan Mishra. "Detection of Online Consumer Satisfaction through Data Mining Technique." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11-SPECIAL ISSUE (November 29, 2019): 25–32. http://dx.doi.org/10.5373/jardcs/v11sp11/20192924.
Full textLi, Li, and Ye Yuan. "Data Preprocessing for Network Intrusion Detection." Applied Mechanics and Materials 20-23 (January 2010): 867–71. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.867.
Full textPelich, Ramona, Marco Chini, Renaud Hostache, Patrick Matgen, Carlos Lopez-Martinez, Miguel Nuevo, Philippe Ries, and Gerd Eiden. "Large-Scale Automatic Vessel Monitoring Based on Dual-Polarization Sentinel-1 and AIS Data." Remote Sensing 11, no. 9 (May 7, 2019): 1078. http://dx.doi.org/10.3390/rs11091078.
Full textHu, Xiao Bing. "Abnormal Events Detection in Traffic Data." Advanced Materials Research 779-780 (September 2013): 525–29. http://dx.doi.org/10.4028/www.scientific.net/amr.779-780.525.
Full textKumar, Sandeep, Muhammad Badruddin Khan, Mozaherul Hoque Abul Hasanat, Abdul Khader Jilani Saudagar, Abdullah AlTameem, and Mohammed AlKhathami. "An Anomaly Detection Framework for Twitter Data." Applied Sciences 12, no. 21 (November 1, 2022): 11059. http://dx.doi.org/10.3390/app122111059.
Full textZhang, Minghu, Jianwen Guo, Xin Li, and Rui Jin. "Data-Driven Anomaly Detection Approach for Time-Series Streaming Data." Sensors 20, no. 19 (October 2, 2020): 5646. http://dx.doi.org/10.3390/s20195646.
Full textMULLER, PRIYA SHIRLEY. "Early Detection of Diabetes during Pregnancy Using Data Mining Tool." Journal of Research on the Lepidoptera 51, no. 2 (June 25, 2020): 936–45. http://dx.doi.org/10.36872/lepi/v51i2/301147.
Full textKurien, K. Leena, and Dr Ajeet Chikkamannur. "A Survey of Methodaology of Fraud Detection Using Data Mining." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 38–42. http://dx.doi.org/10.31142/ijtsrd2482.
Full textBauer, Peter, Dirk Burose, and Jörg Schulz. "Rain detection over land surfaces using passive microwave satellite data." Meteorologische Zeitschrift 11, no. 1 (March 5, 2002): 37–48. http://dx.doi.org/10.1127/0941-2948/2002/0011-0037.
Full textFawaiq, Mohammad Nur, Ema Utami, and Dhani Ariatmanto. "Rice Plant Disease Detection with Data Augmentation Using Transfer Learning." International Journal of Research Publication and Reviews 4, no. 4 (April 8, 2023): 2195–99. http://dx.doi.org/10.55248/gengpi.2023.4.4.35530.
Full textShabtai, Asaf, Maya Bercovitch, Lior Rokach, and Yuval Elovici. "Optimizing Data Misuse Detection." ACM Transactions on Knowledge Discovery from Data 8, no. 3 (June 2, 2014): 1–23. http://dx.doi.org/10.1145/2611520.
Full textWester, Benjamin, David Devecsery, Peter M. Chen, Jason Flinn, and Satish Narayanasamy. "Parallelizing data race detection." ACM SIGARCH Computer Architecture News 41, no. 1 (March 29, 2013): 27–38. http://dx.doi.org/10.1145/2490301.2451120.
Full textShrivastava, Pranav, Prerna Agarwal, Rahul, and Monika. "WiFi Data Leakage Detection." IOP Conference Series: Materials Science and Engineering 804 (June 17, 2020): 012042. http://dx.doi.org/10.1088/1757-899x/804/1/012042.
Full textWester, Benjamin, David Devecsery, Peter M. Chen, Jason Flinn, and Satish Narayanasamy. "Parallelizing data race detection." ACM SIGPLAN Notices 48, no. 4 (April 23, 2013): 27–38. http://dx.doi.org/10.1145/2499368.2451120.
Full textChen, Pei Jiang. "Headlight Detection and Error Correction of Measurement Data." Applied Mechanics and Materials 740 (March 2015): 535–38. http://dx.doi.org/10.4028/www.scientific.net/amm.740.535.
Full textDudczyk, Janusz, Roman Czyba, and Krzysztof Skrzypczyk. "Multi-Sensory Data Fusion in Terms of UAV Detection in 3D Space." Sensors 22, no. 12 (June 7, 2022): 4323. http://dx.doi.org/10.3390/s22124323.
Full textDaza Santacoloma, Genaro, Julio Fernando Suárez Cifuentes, and Germán Castellanos Domínguez. "Biosignal data preprocessing: a voice pathology detection application." Ingeniería e Investigación 29, no. 3 (September 1, 2009): 92–96. http://dx.doi.org/10.15446/ing.investig.v29n3.15189.
Full textJia, Xue Fei, Ning Bu, Shang Gao, and Tao Li. "Sensitive Data Leak Detection Based on Boundary Detection." Advanced Materials Research 1049-1050 (October 2014): 1154–58. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1154.
Full textN.Holambe, Sushilkumar, Ulhas B. Shinde, and Archana U. Bhosale. "The Guilt Detection Approach in Data Leakage Detection." International Journal of Computer Applications 119, no. 8 (June 18, 2015): 38–43. http://dx.doi.org/10.5120/21091-3786.
Full textElvidge, Christopher, Mikhail Zhizhin, Kimberly Baugh, Feng Hsu, and Tilottama Ghosh. "Extending Nighttime Combustion Source Detection Limits with Short Wavelength VIIRS Data." Remote Sensing 11, no. 4 (February 15, 2019): 395. http://dx.doi.org/10.3390/rs11040395.
Full textLu, Tianyuan, Lei Wang, and Xiaoyong Zhao. "Review of Anomaly Detection Algorithms for Data Streams." Applied Sciences 13, no. 10 (May 22, 2023): 6353. http://dx.doi.org/10.3390/app13106353.
Full textBurgos, Julian M., and John K. Horne. "Sensitivity analysis and parameter selection for detecting aggregations in acoustic data." ICES Journal of Marine Science 64, no. 1 (October 25, 2006): 160–68. http://dx.doi.org/10.1093/icesjms/fsl007.
Full textAmro, Ahmed, Aybars Oruc, Vasileios Gkioulos, and Sokratis Katsikas. "Navigation Data Anomaly Analysis and Detection." Information 13, no. 3 (February 23, 2022): 104. http://dx.doi.org/10.3390/info13030104.
Full textYang, Fei, Zhenxing Yao, and Peter J. Jin. "GPS and Acceleration Data in Multimode Trip Data Recognition Based on Wavelet Transform Modulus Maximum Algorithm." Transportation Research Record: Journal of the Transportation Research Board 2526, no. 1 (January 2015): 90–98. http://dx.doi.org/10.3141/2526-10.
Full textMao, Jiang Kun, and Fan Zhan. "Study on Intrusion Detection System Based on Data Mining." Applied Mechanics and Materials 713-715 (January 2015): 2499–502. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2499.
Full textYadav, R., A. Nascetti, and Y. Ban. "BUILDING CHANGE DETECTION USING MULTI-TEMPORAL AIRBORNE LIDAR DATA." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIII-B3-2022 (May 31, 2022): 1377–83. http://dx.doi.org/10.5194/isprs-archives-xliii-b3-2022-1377-2022.
Full textJ.Jabez, J. Jabez, and Dr G. S. Anandha Mala. "Multi-Level Security System for Anomaly Detection in Cloud Based Data." Indian Journal of Applied Research 4, no. 4 (October 1, 2011): 114–17. http://dx.doi.org/10.15373/2249555x/apr2014/33.
Full textS.N., Sithi Shamila. "Performance Analysis of Detection of Video for Secured Cloud Data Service." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 4232–46. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020139.
Full textLixia Ji, Lixia Ji, Xiao Zhang Lixia Ji, Yao Zhao Xiao Zhang, and Zongkun Li Yao Zhao. "Anomaly Detection of Dam Monitoring Data based on Improved Spectral Clustering." 網際網路技術學刊 23, no. 4 (July 2022): 749–59. http://dx.doi.org/10.53106/160792642022072304010.
Full textDesai, Vinod, and H. A. Dinesh. "Efficient Reputation-based Cyber Attack Detection Mechanism for Big Data Environment." Indian Journal of Science and Technology 15, no. 13 (April 5, 2022): 592–602. http://dx.doi.org/10.17485/ijst/v15i13.2102.
Full textAbid, Mahwish, Muhammad Usman, and Muhammad Waleed Ashraf. "Plagiarism Detection Process using Data Mining Techniques." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 5, no. 4 (December 20, 2017): 68. http://dx.doi.org/10.3991/ijes.v5i4.7869.
Full textHow, Jason Richard, and Simon de Lestang. "Acoustic tracking: issues affecting design, analysis and interpretation of data from movement studies." Marine and Freshwater Research 63, no. 4 (2012): 312. http://dx.doi.org/10.1071/mf11194.
Full textFayad, Ibrahim, Nicolas Baghdadi, Hassan Bazzi, and Mehrez Zribi. "Near Real-Time Freeze Detection over Agricultural Plots Using Sentinel-1 Data." Remote Sensing 12, no. 12 (June 19, 2020): 1976. http://dx.doi.org/10.3390/rs12121976.
Full textPeriyasamy, A. R. Pon, and E. Thenmozhi. "Data Leakage Detection and Data Prevention Using Algorithm." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 4 (April 30, 2017): 251–56. http://dx.doi.org/10.23956/ijarcsse/v7i4/0121.
Full textDhawase, Shubhangi G., Bhagyashri J. Chaudhari, Neha S. Kolambe, and Poonam S. Masare. "Data Leakage Detection and Prevention of Confidential Data." International Journal of Computer Sciences and Engineering 6, no. 6 (June 30, 2018): 213–18. http://dx.doi.org/10.26438/ijcse/v6i6.213218.
Full textSiu, Y. M., C. K. Chan, and K. L. Ho. "Teletext data change detection and noiseless data compression." IEEE Transactions on Consumer Electronics 41, no. 4 (1995): 1061–68. http://dx.doi.org/10.1109/30.477224.
Full textMalki, Oliver, Frank Przygodda, Heiko Trautner, and Hartmut Richter. "Data Detection Methods for Holographic Data Storage Systems." Japanese Journal of Applied Physics 49, no. 8 (August 20, 2010): 08KD11. http://dx.doi.org/10.1143/jjap.49.08kd11.
Full textTogbe, Maurras Ulbricht, Yousra Chabchoub, Aliou Boly, Mariam Barry, Raja Chiky, and Maroua Bahri. "Anomalies Detection Using Isolation in Concept-Drifting Data Streams." Computers 10, no. 1 (January 19, 2021): 13. http://dx.doi.org/10.3390/computers10010013.
Full textBazylevych, Volodymyr, and Maria Prybytko. "FAKE NEWS DETECTION SYSTEM BASED ON DATA SCIENCE." Technical Sciences and Technologies, no. 4(22) (2020): 91–95. http://dx.doi.org/10.25140/2411-5363-2020-4(22)-91-95.
Full textSyed Abd Mutalib, Sharifah Sakinah, Siti Zanariah Satari, and Wan Nur Syahidah Wan Yusoff. "A Review on Outliers-Detection Methods for Multivariate Data." Journal of Statistical Modelling and Analytics 3, no. 1 (July 1, 2021): 1–15. http://dx.doi.org/10.22452/josma.vol3no1.1.
Full text