Search alternatives:
duplication algorithm » pollination algorithm (Expand Search), detection algorithm (Expand Search), auction algorithm (Expand Search)
injection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
duplication algorithm » pollination algorithm (Expand Search), detection algorithm (Expand Search), auction algorithm (Expand Search)
injection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
-
1
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
2
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
-
3
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
4
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
Get full text
Get full text
-
5
-
6
K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation
Published 2022“…This paper introduces K Nearest Neighbor OveRsampling (KNNOR) Algorithm — a novel data augmentation technique that considers the distribution of data and takes into account the k nearest neighbors while generating artificial data points. …”
-
7
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …”
-
8
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
9
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
10
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
11
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
12
Topology and parameter estimation in power systems through inverter-based broadband stimulations
Published 2015“…To test its capabilities, the performance of this algorithm is evaluated on a small-scale test system.…”
Get full text
Get full text
Get full text
Get full text
article -
13
Positive Unlabelled Learning to Recognize Dishes as Named Entity
Published 2019“…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …”
Get full text
-
14
Estimation of power grid topology parameters through pilot signals
Published 2016“…The measured data is evaluated through correlation, and a weighed least-square algorithm, applied to the network’s dynamic model, estimates those unknown parameters and provides an accurate snapshot of the power network topology. …”
Get full text
Get full text
Get full text
conferenceObject