Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
erf algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), search algorithm (Expand Search)
element erf » elementi per (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
erf algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), search algorithm (Expand Search)
element erf » elementi per (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
21
-
22
-
23
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…The imaging results demonstrated that the implemented MBI system can successfully detect the target benign and malignant tumors with their locations inside the brain.…”
-
24
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
25
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
Published 2021“…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …”
-
26
-
27
-
28
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
29
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
30
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
Published 2024“…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
-
31
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
32
-
33
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
Published 2017Get full text
doctoralThesis -
34
-
35
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis -
36
Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine
Published 2025“…<p>Artificial intelligence (AI) is revolutionizing epilepsy care by advancing seizure detection, enhancing diagnostic precision, and enabling personalized treatment. …”
-
37
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
38
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
Get full text
Get full text
Get full text
article -
39
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
-
40
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …”