-
1
Partial grid false data injection attacks against state estimation
Published 2019“…The addition of an external communication layer to the power system has left it vulnerable to cyberattacks. False data injection (FDI) can be used to manipulate measurements that are used to estimate the state of the power system. …”
Get full text
Get full text
Get full text
Get full text
article -
2
Modified Particle Filters for Detection of False Data Injection Attacks and State Estimation in Networked Nonlinear Systems
Published 2022“…<p>Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. …”
-
3
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
Published 2023“…A MATLAB/Simulink-based simulation model of the process validated with actual data from a local plant is used. …”
-
4
The Use of Artificial Intelligence and Big Data in the Continuous Improvement Process of Engineering Curricula
Published 2019“…A Master of Science thesis in Engineering Systems Management by Basel Obaid entitled, “The Use of Artificial Intelligence and Big Data in the Continuous Improvement Process of Engineering Curricula”, submitted in July 2019. …”
Get full text
doctoralThesis -
5
ON ENHANCED PROCESS MONITORING USING MEMORY SCHEMES FOR HIGH-DIMENSIONAL DATA
Published 2020Get full text
masterThesis -
6
Automated processing of quad array data
Published 1991“…A quad array acoustic imaging system used in underwater applications is discussed. In this configuration, a 2N-element crossed array results in an effective data aperture equivalent to that of a N2 filled array. …”
Get full text
Get full text
article -
7
Automated processing of quad array data
Published 1991“…A quad array acoustic imaging system used in underwater applications is discussed. In this configuration, a 2N-element crossed array results in an effective data aperture equivalent to that of a N2 filled array. …”
Get full text
article -
8
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false-positive rate, and computational overhead with respect to the differing number of queries. …”
-
9
-
10
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
11
Impact of an integrated seismic data processing approach
Published 1992“…Results from an integrated seismic data processing approach are presented. The following five industry known techniques are used: The first is pre-stack processing and imaging that resulted in properly placed structures and clearly defined fault planes. …”
Get full text
Get full text
Get full text
conferenceObject -
12
Distributed query optimization using PERF joins
Published 2000Get full text
Get full text
Get full text
Get full text
conferenceObject -
13
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
Published 2016Get full text
doctoralThesis -
14
-
15
-
16
Unsupervised Feature-Based Visualization Tool Applied on Medical Data
Published 2020“…It then invokes a hierarchical clustering process to cluster the data following the user-chosen features, and produces a dendrogram structure for each combination of target features. …”
Get full text
Get full text
Get full text
masterThesis -
17
An Empirical Analysis of NMT-Derived Interlingual Embeddings and Their Use in Parallel Sentence Identification
Published 2017“…Second, as extrinsic evaluation of the first point, we identify parallel sentences in comparable corpora, obtaining an F <sub>1</sub> =98.2% on data from a shared task when using only NMT context vectors. …”
-
18
Difficulties and Improvements to Graph-Based Lexical Sentiment Analysis Using LISA
Published 2019“…Lexical sentiment analysis (LSA) underlines a family of methods combining natural language processing, machine learning, or graph navigation techniques to identify the underlying sentiments or emotions carried in textual data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
The TOR Data Communication System
Published 2014Get full text
Get full text
Get full text
Get full text
conferenceObject -
20