-
1
Partial grid false data injection attacks against state estimation
منشور في 2019"…The addition of an external communication layer to the power system has left it vulnerable to cyberattacks. False data injection (FDI) can be used to manipulate measurements that are used to estimate the state of the power system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
2
Modified Particle Filters for Detection of False Data Injection Attacks and State Estimation in Networked Nonlinear Systems
منشور في 2022"…<p>Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. …"
-
3
-
4
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
منشور في 2023"…A MATLAB/Simulink-based simulation model of the process validated with actual data from a local plant is used. …"
-
5
The Use of Artificial Intelligence and Big Data in the Continuous Improvement Process of Engineering Curricula
منشور في 2019"…A Master of Science thesis in Engineering Systems Management by Basel Obaid entitled, “The Use of Artificial Intelligence and Big Data in the Continuous Improvement Process of Engineering Curricula”, submitted in July 2019. …"
احصل على النص الكامل
doctoralThesis -
6
ON ENHANCED PROCESS MONITORING USING MEMORY SCHEMES FOR HIGH-DIMENSIONAL DATA
منشور في 2020احصل على النص الكامل
masterThesis -
7
Automated processing of quad array data
منشور في 1991"…A quad array acoustic imaging system used in underwater applications is discussed. In this configuration, a 2N-element crossed array results in an effective data aperture equivalent to that of a N2 filled array. …"
احصل على النص الكامل
احصل على النص الكامل
article -
8
Automated processing of quad array data
منشور في 1991"…A quad array acoustic imaging system used in underwater applications is discussed. In this configuration, a 2N-element crossed array results in an effective data aperture equivalent to that of a N2 filled array. …"
احصل على النص الكامل
article -
9
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
منشور في 2021"…Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false-positive rate, and computational overhead with respect to the differing number of queries. …"
-
10
-
11
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. …"
احصل على النص الكامل
-
12
Impact of an integrated seismic data processing approach
منشور في 1992"…Results from an integrated seismic data processing approach are presented. The following five industry known techniques are used: The first is pre-stack processing and imaging that resulted in properly placed structures and clearly defined fault planes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
13
Distributed query optimization using PERF joins
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
14
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
منشور في 2016احصل على النص الكامل
doctoralThesis -
15
-
16
-
17
-
18
Unsupervised Feature-Based Visualization Tool Applied on Medical Data
منشور في 2020"…It then invokes a hierarchical clustering process to cluster the data following the user-chosen features, and produces a dendrogram structure for each combination of target features. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
19
An Empirical Analysis of NMT-Derived Interlingual Embeddings and Their Use in Parallel Sentence Identification
منشور في 2017"…Second, as extrinsic evaluation of the first point, we identify parallel sentences in comparable corpora, obtaining an F <sub>1</sub> =98.2% on data from a shared task when using only NMT context vectors. …"
-
20
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
منشور في 2020"…This conclusion was achieved after preprocessing a number of data values from these data sets.…"