40   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Aris Lanaridis, Giorgos Siolas and Andreas Stafylopatis    
Pattern classification is a central problem in machine learning, with a wide array of applications, and rule-based classifiers are one of the most prominent approaches. Among these classifiers, Incremental Rule Learning algorithms combine the advantages ... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Sulemana Nantogma, Keyu Pan, Weilong Song, Renwei Luo and Yang Xu    
Unmanned autonomous vehicles for various civilian and military applications have become a particularly interesting research area. Despite their many potential applications, a related technological challenge is realizing realistic coordinated autonomous c... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer and Rasha Kashef    
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information. Mode... ver más
Revista: AI    Formato: Electrónico

 
en línea
Shruti Patil, Vijayakumar Varadarajan, Devika Walimbe, Siddharth Gulechha, Sushant Shenoy, Aditya Raina and Ketan Kotecha    
Cyber security is used to protect and safeguard computers and various networks from ill-intended digital threats and attacks. It is getting more difficult in the information age due to the explosion of data and technology. There is a drastic rise in the ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Usman Javed Butt, Osama Hussien, Krison Hasanaj, Khaled Shaalan, Bilal Hassan and Haider al-Khateeb    
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by usin... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed    
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Duo Sun, Lei Zhang, Kai Jin, Jiasheng Ling and Xiaoyuan Zheng    
Aiming at the imbalance of industrial control system data and the poor detection effect of industrial control intrusion detection systems on network attack traffic problems, we propose an ETM-TBD model based on hybrid machine learning and neural network ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mohammed Zakariah and Abdulaziz S. Almazyad    
The prevalence of Internet of Things (IoT) technologies is on the rise, making the identification of anomalies in IoT systems crucial for ensuring their security and reliability. However, many existing approaches rely on static classifiers and immutable ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ibrahim Ba?abbad and Omar Batarfi    
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Xiaosong Zhao, Lei Zhang, Yixin Cao, Kai Jin and Yupeng Hou    
Anomaly detection problems in industrial control systems (ICSs) are always tackled by a network traffic monitoring scheme. However, traffic-based anomaly detection systems may be deceived by anomalous behaviors that mimic normal system activities and fai... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ilias Lazarou, Anastasios L. Kesidis, George Hloupis and Andreas Tsatsaris    
It is common sense that immediate response and action are among the most important terms when it comes to public safety, and emergency response systems (ERS) are technology components strictly tied to this purpose. While the use of ERSs is increasingly a... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Rubayyi Alghamdi and Martine Bellaiche    
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastruc... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Nuria Rodriguez-Diaz, Decky Aspandi, Federico M. Sukno and Xavier Binefa    
Lie detection is considered a concern for everyone in their day-to-day life, given its impact on human interactions. Thus, people normally pay attention to both what their interlocutors are saying and to their visual appearance, including the face, to fi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Roman Kuzmich, Alena Stupina, Andrey Yasinskiy, Mariia Pokushko, Roman Tsarev and Ivan Boubriak    
The study is dictated by the need to make reasonable decisions in the classification of observations, for example, in the problems of medical prediction and diagnostics. Today, as part of the digitalization in healthcare, decision-making by a doctor is c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Paulo J. S. Ferreira, João M. P. Cardoso and João Mendes-Moreira    
The kNN machine learning method is widely used as a classifier in Human Activity Recognition (HAR) systems. Although the kNN algorithm works similarly both online and in offline mode, the use of all training instances is much more critical online than of... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva    
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Charalampos Papakonstantinou, Ioannis Daramouskas, Vaios Lappas, Vassilis C. Moulianitis and Vassilis Kostopoulos    
This paper addresses the problem of singularity avoidance for a 4-Control Moment Gyroscope (CMG) pyramid cluster, as used for the attitude control of a satellite using machine learning (ML) techniques. A data-set, generated using a heuristic algorithm, r... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Ali Al-Laith, Muhammad Shahbaz, Hind F. Alaskar and Asim Rehmat    
At a time when research in the field of sentiment analysis tends to study advanced topics in languages, such as English, other languages such as Arabic still suffer from basic problems and challenges, most notably the availability of large corpora. Furth... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sultan Almalki, Nasser Assery and Kaushik Roy    
While the password-based authentication used in social networks, e-mail, e-commerce, and online banking is vulnerable to hackings, biometric-based continuous authentication systems have been used successfully to handle the rise in unauthorized accesses. ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Filippo Giammaria Praticò, Rosario Fedele, Vitalii Naumov and Tomas Sauer    
The current methods that aim at monitoring the structural health status (SHS) of road pavements allow detecting surface defects and failures. This notwithstanding, there is a lack of methods and systems that are able to identify concealed cracks (particu... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »