We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 101-120 of 1,481 results
  1. System Intrusion Detection and Prevention

    Psychologically there is value attached to ownership of an asset. How much is spent on protecting the asset determines the value of the asset. Once a...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  2. Composite Fault Signal Detection Method of Electromechanical Equipment Based on Empirical Mode Decomposition

    Aiming at the problem of low detection accuracy when the traditional method is used to detect the composite fault signal of electromechanical...
    Guolong Fu, **tian Yin, ... Zhihua Peng in Advanced Hybrid Information Processing
    Conference paper 2023
  3. A review on fall detection systems in bathrooms: challenges and opportunities

    The share of the aged population over and above 65 years increased from 6% in 1990 to 9% in 2019. The percentage of the aged population might...

    Ramanujam E, Thinagaran Perumal, Shankar K in Multimedia Tools and Applications
    Article 12 January 2024
  4. An LSTM Framework for the Effective Screening of Dementia for Deployment on Edge Devices

    Dementia is a series of neurodegenerative disorders that affect 1 in 4 people over the age of 80 and can greatly reduce the quality of life of those...
    Bernard Wilkie, Karla Muñoz Esquivel, Jamie Roche in Digital Health and Wireless Solutions
    Conference paper Open access 2024
  5. On time series representations for multi-label NILM

    Given only the main power consumption of a household, a non-intrusive load monitoring (NILM) system identifies which appliances are operating. With...

    Christoforos Nalmpantis, Dimitris Vrakas in Neural Computing and Applications
    Article 02 May 2020
  6. Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network

    The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge...

    Yan Zhou, Huiling Shi, ... Wei Zhang in Journal of Cloud Computing
    Article Open access 10 April 2023
  7. Intelligent energy management systems: a review

    Climate change has become a major problem for humanity in the last two decades. One of the reasons that caused it, is our daily energy waste. People...

    Stavros Mischos, Eleanna Dalagdi, Dimitrios Vrakas in Artificial Intelligence Review
    Article Open access 13 March 2023
  8. TrIDS: an intelligent behavioural trust based IDS for smart healthcare system

    The Medical Cyber-Physical Systems (MCPS) are composed of several medical devices and low-cost sensors for real-time diagnosis, monitoring, and...

    Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy in Cluster Computing
    Article 23 May 2022
  9. The Evaluations of the Impact of the Pilot’s Visual Behaviours on the Landing Performance by Using Eye Tracking Technology

    Introduction. Eye tracking technology can be used to characterise a pilot's visual behaviour as well as to further analyse the workload and status of...
    Yifan Wang, Lichao Yang, ... Wen-Chin Li in Engineering Psychology and Cognitive Ergonomics
    Conference paper 2023
  10. AI-big data analytics for building automation and management systems: a survey, actual challenges and future perspectives

    In theory, building automation and management systems (BAMSs) can provide all the components and functionalities required for analyzing and operating...

    Yassine Himeur, Mariam Elnour, ... Abbes Amira in Artificial Intelligence Review
    Article Open access 15 October 2022
  11. Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics

    Energy consumption data is collected the service providers and shared with various stakeholders involved in a smart grid ecosystem. The fine-grained...
    Nazim Uddin Sheikh, Zhigang Lu, ... Mohamed Ali Kaafar in E-Business and Telecommunications
    Conference paper 2023
  12. Concurrent runtime verification of data rich events

    This paper presents the open-source runtime verification tool MESA (MEssage-based System Analysis), implemented in Scala, which supports concurrent...

    Nastaran Shafiei, Klaus Havelund, Peter Mehlitz in International Journal on Software Tools for Technology Transfer
    Article 26 June 2023
  13. Vital signs estimation in elderly using camera-based photoplethysmography

    In the context of Ambient Assisted Living, the demand for healthcare technologies development has been increased in the last two years by the current...

    Andrea Caroppo, Andrea Manni, ... Alessandro Leone in Multimedia Tools and Applications
    Article Open access 16 January 2024
  14. Real-Time Human Activity Recognition in Smart Home on Embedded Equipment: New Challenges

    Building Energy Management (BEM) and monitoring systems should not only consider HVAC systems and building physics but also human behaviors. These...
    Houda Najeh, Christophe Lohr, Benoit Leduc in Participative Urban Health and Healthy Aging in the Age of AI
    Conference paper Open access 2022
  15. SMarT: A SMT Based Privacy Preserving Smart Meter Streaming Methodology

    Smart metering is a mechanism through which fine-grained power consumption profiles of the consumers are collected periodically in a Smart grid....
    Soumyadyuti Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  16. “Hello? Is There Anybody in There?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure

    Smart meters provide fine-grained power usage profiles of consumers to utility providers to facilitate various grid functionalities such as load...
    Soumyadyuti Ghosh, Manaar Alam, ... Debdeep Mukhopadhyay in Applied Cryptography and Network Security
    Conference paper 2024
  17. Deep Learning Techniques for Smart Meter Data Analytics: A Review

    The field of smart meter data analytics is a relatively young field that recently grew due to the wealth of data generated from smart meters. Recent...

    Elham Eskandarnia, Hesham Al-Ammal, ... Mustafa Hammad in SN Computer Science
    Article 25 April 2022
  18. An optimisation-based energy disaggregation algorithm for low frequency smart meter data

    An algorithm for the non-intrusive disaggregation of energy consumption into its end-uses, also known as non-intrusive appliance load monitoring...

    Cristina Rottondi, Marco Derboni, ... Andrea Emilio Rizzoli in Energy Informatics
    Article Open access 27 September 2019
  19. DFTMicroagg: a dual-level anonymization algorithm for smart grid data

    The introduction of advanced metering infrastructure (AMI) smart meters has given rise to fine-grained electricity usage data at different levels of...

    Kayode S. Adewole, Vicenç Torra in International Journal of Information Security
    Article Open access 07 September 2022
Did you find what you were looking for? Share feedback.