بدائل البحث:
duplication algorithm » pollination algorithm (توسيع البحث), detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
injection algorithm » detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
duplication algorithm » pollination algorithm (توسيع البحث), detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
injection algorithm » detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
-
1
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
2
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
منشور في 2024"…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …"
-
3
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
منشور في 2022"…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
-
4
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
احصل على النص الكامل
احصل على النص الكامل
-
5
-
6
K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation
منشور في 2022"…This paper introduces K Nearest Neighbor OveRsampling (KNNOR) Algorithm — a novel data augmentation technique that considers the distribution of data and takes into account the k nearest neighbors while generating artificial data points. …"
-
7
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
منشور في 2023"…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …"
-
8
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
منشور في 2025احصل على النص الكامل
doctoralThesis -
9
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
منشور في 2024احصل على النص الكامل
doctoralThesis -
10
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
11
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
منشور في 2021"…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …"
-
12
Topology and parameter estimation in power systems through inverter-based broadband stimulations
منشور في 2015"…To test its capabilities, the performance of this algorithm is evaluated on a small-scale test system.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
13
Positive Unlabelled Learning to Recognize Dishes as Named Entity
منشور في 2019"…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …"
احصل على النص الكامل
-
14
Estimation of power grid topology parameters through pilot signals
منشور في 2016"…The measured data is evaluated through correlation, and a weighed least-square algorithm, applied to the network’s dynamic model, estimates those unknown parameters and provides an accurate snapshot of the power network topology. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject