يعرض 1 - 14 نتائج من 14 نتيجة بحث عن '(( data injection algorithm ) OR ( data duplication algorithm ))', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 1
  2. 2

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security حسب Muhammad Maaz (5600600)

    منشور في 2024
    "…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …"
  3. 3

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  4. 4

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
    احصل على النص الكامل
    احصل على النص الكامل
  5. 5
  6. 6

    K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation حسب Ashhadul Islam (16869981)

    منشور في 2022
    "…This paper introduces K Nearest Neighbor OveRsampling (KNNOR) Algorithm — a novel data augmentation technique that considers the distribution of data and takes into account the k nearest neighbors while generating artificial data points. …"
  7. 7

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks حسب Haris M. Khalid (17017743)

    منشور في 2023
    "…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …"
  8. 8
  9. 9
  10. 10

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 11

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier حسب Syed Ali Jafar Zaidi (19563178)

    منشور في 2021
    "…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …"
  12. 12
  13. 13

    Positive Unlabelled Learning to Recognize Dishes as Named Entity حسب TAREK, AIMAN

    منشور في 2019
    "…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …"
    احصل على النص الكامل
  14. 14

    Estimation of power grid topology parameters through pilot signals حسب Hargossian, H.

    منشور في 2016
    "…The measured data is evaluated through correlation, and a weighed least-square algorithm, applied to the network’s dynamic model, estimates those unknown parameters and provides an accurate snapshot of the power network topology. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject