Search alternatives:
integration algorithm » detection algorithm (Expand Search)
injection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
data integration » scale integration (Expand Search)
integration algorithm » detection algorithm (Expand Search)
injection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
data integration » scale integration (Expand Search)
-
1
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Subjects: “…Integrated circuits -- Very large scale integration…”
Get full text
Get full text
Get full text
masterThesis -
2
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
3
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…For the future improvements can be done to this work by integrating other related data such as social media news using sentimental analysis. …”
Get full text
-
4
-
5
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
Get full text
-
6
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
-
7
Using Machine Learning Algorithms to Forecast Solar Energy Power Output
Published 2025“…The data forecasting horizon used was a 24-h window in steps of 30 min. …”
-
8
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…However, security challenges can put such distributed databases storing sensitive healthcare data under threat. For example, attackers can access highly sensitive data, altering or deleting some records, or violating the integrity of the database. …”
Get full text
Get full text
Get full text
masterThesis -
9
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …”
-
10
-
11
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
-
12
-
13
An enhanced quorum selection algorithm
Published 2009Get full text
Get full text
Get full text
article -
14
An Improved Quorum Selection Algorithm
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
15
-
16
-
17
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …”
-
18
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
19
An improved quorum selection algorithm (IQSA). (c2007)
Published 2007Get full text
Get full text
masterThesis -
20
Social spider optimization algorithm: survey and new applications
Published 2024“…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …”
Get full text