Showing 1 - 20 results of 1,438 for search '(( false data (preprocessing OR processing) ) OR ( use data (preprocessing OR processing) ))', query time: 0.15s Refine Results
  1. 1

    Partial grid false data injection attacks against state estimation by Margossian, Harag

    Published 2019
    “…The addition of an external communication layer to the power system has left it vulnerable to cyberattacks. False data injection (FDI) can be used to manipulate measurements that are used to estimate the state of the power system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 2

    Modified Particle Filters for Detection of False Data Injection Attacks and State Estimation in Networked Nonlinear Systems by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2022
    “…<p>Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. …”
  3. 3
  4. 4

    A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems by Mariam Elnour (14147790)

    Published 2023
    “…A MATLAB/Simulink-based simulation model of the process validated with actual data from a local plant is used. …”
  5. 5

    The Use of Artificial Intelligence and Big Data in the Continuous Improvement Process of Engineering Curricula by Obaid, Basel

    Published 2019
    “…A Master of Science thesis in Engineering Systems Management by Basel Obaid entitled, “The Use of Artificial Intelligence and Big Data in the Continuous Improvement Process of Engineering Curricula”, submitted in July 2019. …”
    Get full text
    doctoralThesis
  6. 6
  7. 7

    Automated processing of quad array data by Abdul-Jauwad, S.H.

    Published 1991
    “…A quad array acoustic imaging system used in underwater applications is discussed. In this configuration, a 2N-element crossed array results in an effective data aperture equivalent to that of a N2 filled array. …”
    Get full text
    Get full text
    article
  8. 8

    Automated processing of quad array data by Abdul-Jauwad, S.H.

    Published 1991
    “…A quad array acoustic imaging system used in underwater applications is discussed. In this configuration, a 2N-element crossed array results in an effective data aperture equivalent to that of a N2 filled array. …”
    Get full text
    article
  9. 9

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false-positive rate, and computational overhead with respect to the differing number of queries. …”
  10. 10
  11. 11

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. …”
    Get full text
  12. 12

    Impact of an integrated seismic data processing approach by Semaan, Mars E.

    Published 1992
    “…Results from an integrated seismic data processing approach are presented. The following five industry known techniques are used: The first is pre-stack processing and imaging that resulted in properly placed structures and clearly defined fault planes. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Unsupervised Feature-Based Visualization Tool Applied on Medical Data by Moufarrej, Angela Sleiman

    Published 2020
    “…It then invokes a hierarchical clustering process to cluster the data following the user-chosen features, and produces a dendrogram structure for each combination of target features. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 19

    An Empirical Analysis of NMT-Derived Interlingual Embeddings and Their Use in Parallel Sentence Identification by Cristina Espana-Bonet (19720063)

    Published 2017
    “…Second, as extrinsic evaluation of the first point, we identify parallel sentences in comparable corpora, obtaining an F <sub>1</sub> =98.2% on data from a shared task when using only NMT context vectors. …”
  20. 20

    Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques by Abdul Karim (417009)

    Published 2020
    “…This conclusion was achieved after preprocessing a number of data values from these data sets.…”