-
21
Robust tuning of power system stabilizers in multimachine powersystems
منشور في 2000"…The effectiveness of the stabilizers tuned using the suggested technique, in enhancing the stability of power systems, is confirmed through eigenvalue analysis and simulation results…"
احصل على النص الكامل
احصل على النص الكامل
article -
22
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
23
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…<p dir="ltr">Pathological cancer research relies heavily on different domain-specific applications including nucleus segmentation from histopathology images. …"
-
24
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …"
-
25
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …"
-
26
Learning-Based Automatic Modulation Classification
منشور في 2015احصل على النص الكامل
doctoralThesis -
27
Hybrid Interval Type-2 Fuzzy PID+I Controller for a Multi-DOF Oilwell Drill-String System
منشور في 2022"…An optimal hybrid interval Type-2 fuzzy PID+I logic controller (OH-IT2FPID+I) using a practical swarm optimization algorithm for a multi-degree-of-freedom oil well drill-string system is proposed in this paper. …"
-
28
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …"
-
29
Malicious URL and Intrusion Detection using Machine Learning
منشور في 2024"…The purpose of this paper is to use machine learning (ML) techniques for malicious websites detection and classification, and intrusion detection. Different ML algorithms were applied, namely Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). …"
احصل على النص الكامل
article -
30
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Caching was suggested as a solution for reducing bandwidth utilization and minimizing query latency in mobile environments. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
31
-
32
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
33
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
34
Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration
منشور في 2025"…Entrapment of the defending phase due to capillarity for different wettability systems are investigated. When the wettability range increases, the trapping efficiency is also seen to increase linearly, suggesting that reservoirs with strong mixed-wet conditions present an attractive option for CO<sub>2</sub> sequestration. …"
-
35
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
منشور في 2023"…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
-
36
From Collatz Conjecture to chaos and hash function
منشور في 2023"…Through comprehensive evaluations conducted under various circumstances and with different datasets, the suggested hash function consistently outperforms the state-of-the-art alternatives. …"
-
37
Data-Driven Electricity Demand Modeling for Electric Vehicles Using Machine Learning
منشور في 2024احصل على النص الكامل
doctoralThesis -
38