-
1
-
2
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
Published 2024“…Developing powerful energy forecasting systems is challenging due to frequent fluctuations in energy demand. The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …”
-
3
-
4
-
5
-
6
-
7
-
8
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …”
-
9
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
Published 2019“…This system consists of two subsystems that communicate wirelessly using Bluetooth low energy technology: A portable digital stethoscope subsystem, and a computer-based decision-making subsystem. …”
-
10
-
11
Formal synthesis of VLSI layouts from algorithmic specifications
Published 2020“…Due to advances in VLSI technology, it is possible to implement complex digital systems on a single chip. …”
Get full text
article -
12
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
Published 2024“…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
-
13
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
-
14
-
15
-
16
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…A detailed analysis of the ML pipelines is provided, and the in-demand methods and algorithms are summarized in augmentative tables and figures. …”
Get full text
article -
17
De-Linkability
Published 2013Get full text
Get full text
Get full text
Get full text
conferenceObject -
18
-
19
Automatic Modulation Recognition Based on the Optimized Linear Combination of Higher-Order Cumulants
Published 2022“…<p dir="ltr">Automatic modulation recognition (AMR) is used in various domains—from general-purpose communication to many military applications—thanks to the growing popularity of the Internet of Things (IoT) and related communication technologies. In this research article, we propose an innovative idea of combining the classical mathematical technique of computing linear combinations (LCs) of cumulants with a genetic algorithm (GA) to create super-cumulants. …”
-
20
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…<p dir="ltr">Due to the rapid growth in IT technology, digital data have increased availability, creating novel security threats that need immediate attention. …”