Search alternatives:
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
121
-
122
-
123
-
124
-
125
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…As a result, the Intrusion Detection System (IDS) is a core component of a modern IoT platform. …”
-
126
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …”
-
127
-
128
-
129
-
130
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …”
-
131
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”
-
132
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…This research paper explores GAI in enhancing cybersecurity by leveraging AI Models and algorithms. GAI can autonomously address common security issues, detect novel threats, and augment human intervention in critical security aspects. …”
-
133
-
134
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…Consequently, the proposed hybrid deep learning anomaly detection approaches not only enhance IoT security but also provide a robust control system for addressing emerging multivariate cyber threats.…”
-
135
Artificial Intelligence and Machine Learning Applications in Sudden Cardiac Arrest Prediction and Management: A Comprehensive Review
Published 2023“…Sudden cardiac arrest (SCA) continues to be a major global cause of death, with survival rates remaining low despite advanced first responder systems. The ongoing challenge is the prediction and prevention of SCA. …”
-
136
-
137
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
138
A 3-D vision-based man-machine interface for hand-controlled telerobot
Published 2005“…The features of the proposed system are: 1) a metric for color matching to discriminate the balls from their background; 2) a uniform and spiral search approach to speed up the detection; 3) tracking in the presence of partial occlusion; 4) consolidate detection by using shape and geometric matching; and 5) dynamic update of the reference colors. …”
Get full text
Get full text
article -
139
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…As a result, the Intrusion Detection System (IDS) is a core component of a modern IoT platform. …”
Get full text
Get full text
Get full text
article -
140
Optimizing ADWIN for Steady Streams
Published 2022“…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …”
Get full text
Get full text
Get full text