Search alternatives:
broader implementation » related implementation (Expand Search), programme implementation (Expand Search)
system implementation » its implementation (Expand Search)
broader implementation » related implementation (Expand Search), programme implementation (Expand Search)
system implementation » its implementation (Expand Search)
-
1
-
2
-
3
-
4
Lightweight intrusion detection for mobile devices. (c2012)
Published 2012Get full text
Get full text
masterThesis -
5
Estimating the reliability of the inspection system employed for detecting defects in rail track using ultrasonic guided waves
Published 2022“…This work focuses on the implementation of a data-based method to determine the inspection system reliability in terms of detecting different types of damages in rail track specimens using ultrasonic guided Rayleigh waves and a probability of detection (POD) technique. …”
Get full text
-
6
-
7
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. The imaging results demonstrated that the implemented MBI system can successfully detect the target benign and malignant tumors with their locations inside the brain.…”
-
8
An IoT Assisted Real-Time High CMRR Wireless Ambulatory ECG Monitoring System with Arrhythmia Detection
Published 2021“…To tackle this problem, in this paper, the development of an Internet of things (IoT) assisted ambulatory electrocardiogram (ECG) monitoring system is presented. The system’s wearable single-channel data acquisition device supports 25 h of continuous operation. …”
-
9
Simulation study of a coincidence detection system for non-invasive determination of arterial blood time-activity curve measurements
Published 2020“…Addition of extra axial detection rings to the half-ring configuration provided increases in system sensitivity by a factor of approximately 10.…”
-
10
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…They are willing to invest their money in fraud detection and control systems that will curb fraud. …”
Get full text
-
11
Performance Evaluation of Optically Preamplified M-ary PPM Systems for Free-Space Optical Communications
Published 2013Get full text
doctoralThesis -
12
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
Published 2023“…The research underscores the significance of establishing a secure and fortified drone network to mitigate interception and intrusion risks. The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. …”
-
13
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis of network traffic. …”
Get full text
-
14
-
15
Plant Disease Classifier: Detection of Dual-Crop Diseases Using Lightweight 2D CNN Architecture
Published 2023“…The purpose of this work is to categorize 14 classes for both cotton and tomato crops, with 12 diseased classes and two healthy classes using a deep learning-based lightweight 2D CNN architecture and to implement the model in an android application named “Plant Disease Classifier” for smartphone-assisted plant disease diagnosis system, the results of the experiments reveal that the proposed model outperforms the pre-trained models VGG16, VGG19 and InceptionV3 despite having fewer parameters. …”
-
16
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
Published 2024“…Leveraging the capabilities of this open-source home automation platform, we have developed a sophisticated system for providing real-time <u>energy consumption data</u>, personalized energy-saving recommendations, and a data-driven occupancy detection mechanism. …”
-
17
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
Published 2023“…This work presents a distributed, machine learning based attack detection and mitigation framework for sensor false data injection cyber-physical attacks in industrial control systems. …”
-
18
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
19
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…In this context, this paper presents an improved framework (SDN-ML-IoT) that works as an Intrusion and Prevention Detection System (IDPS) that could help to detect DDoS attacks with more efficiency and mitigate them in real time. …”
-
20
Audio-deepfake detection: Adversarial attacks and countermeasures
Published 2024“…<p>Audio has always been a powerful resource for biometric authentication: thus, numerous AI-based audio authentication systems (classifiers) have been proposed. While these classifiers are effective in identifying legitimate human-generated input their security, to the best of our knowledge, has not been explored thoroughly when confronted with advanced attacks that leverage AI-generated deepfake audio. …”