We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 1,205 results
  1. Hybrid Data-Driven Machine Learning Framework for Determining Prestressed Concrete Losses

    This study presents a hybrid data-driven machine learning framework utilizing Bayesian regularization-based artificial neural network (ANN) and...

    Ahmad Tarawneh, Eman Saleh, ... Abdullah Alghossoon in Arabian Journal for Science and Engineering
    Article 03 March 2023
  2. Darknet Traffic Detection Using Histogram-Based Gradient Boosting

    The network security sector has observed a rise in severe attacks emanating from the darknet or encrypted networks in recent years. Network intrusion...
    Dane Brown, Chikondi Sepula in Inventive Systems and Control
    Conference paper 2023
  3. Demonstration of MITM Attack in Synchrophasor Network Using MAC Spoofing

    Communication is critical for power system operation and control. Data transfer via digital means is vulnerable to security and privacy concerns....
    Amit Tiwari, Shivam Verma, Varun Shukla in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  4. Influence of the Gradual Ignition of a Powder in a Gun and of its Nonstationary and Erosion Burning on the Internal Ballistics of a Gunshot

    A mathematical simulation of the internal ballistics of a shot from a gun, depending on the design of the charge of the gun, has been performed. A...

    I. G. Rusyak, A. M. Lipanov in Journal of Engineering Physics and Thermophysics
    Article 01 November 2023
  5. Design and Implementation of a Quantitative Network Health Monitoring and Recovery System

    A network health monitoring system focuses on the quantification of the network’s health by taking into account various security flaws, leaks, and...

    Harshit Gujral, Abhinav Sharma, ... Sangeeta Mittal in Wireless Personal Communications
    Article 25 March 2022
  6. CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model

    Cloud computing has become the most significant technology in today’s world as it provides several services including physical resources and...
    Conference paper 2023
  7. A Detailed Analysis of the CIDDS-001 and CICIDS-2017 Datasets

    The contributions of this paper are threefold—(i) to provide a detailed analysis of two benchmark datasets CIDDS-001 and CICIDS-2017, (ii) to...
    K. Vamsi Krishna, K. Swathi, ... B. Basaveswara Rao in Pervasive Computing and Social Networking
    Conference paper 2022
  8. SAPV Sizing Optimization: A Numerical Iterative Method Using LTE Base Station Profile in SA

    The quest for a green renewable energy source in replacement of conventional energy such as fossil fuel, diesel generator, or electric grid has taken...
    Ely Ondo-Ekogha, Pius A. Owolawi in Artificial Intelligence and Sustainable Computing
    Conference paper 2023
  9. Domain Knowledge-Aided Explainable Artificial Intelligence

    The lack of human-friendly explanations from Artificial Intelligence (AI)—based decisions is a major concern for high stake applications. Towards...
    Sheikh Rabiul Islam, William Eberle in Explainable Artificial Intelligence for Cyber Security
    Chapter 2022
  10. Complex for Research of Power and Speed Losses in Tires of the Car, at Their Rolling on Rollers of the Diagnostic Stand

    The article presents the calculation of the efficiency of an elastic tire of an automobile wheel. Its influence on the errors associated with the...
    Oleg Yankov, Anton Chernyshkov, Roman Sergushko in Safety in Aviation and Space Technologies
    Conference paper 2022
  11. Using Recursive Feature Elimination and Fisher Score with Convolutional Neural Network for Identifying Port Scan Attempts

    Port scanning is a frequently used service in the internet with its usage done by both network defenders as well as attackers. Detecting Port scan...
    Kuljeet Singh, Amit Mahajan, Vibhakar Mansotra in Smart Trends in Computing and Communications
    Conference paper 2022
  12. A Mathematical Optimization Framework for Managing the Renewable Energy to Attain Maximum Power

    Renewable energy generation is a critical component of society’s long-term sustainability, and numerous energy sources, including biogas, solar,...

    Mahmoud M. Selim, Saad Althobaiti in Arabian Journal for Science and Engineering
    Article 31 October 2022
  13. Digitization of the Mechanical Articulator: Virtual Articulator

    This study presents the digitalization of the dental articulator, which is a device used by dentists as a replica of the patient’s mouth. For this...
    José Antonio Oriozabala-Brit, Xabier Amezua-Lasuen, ... Eneko Solaberrieta-Mendez in Advances in Design Engineering
    Conference paper 2020
  14. Numerical Study Effect Using Low Rank Coal on Flow Characteristics, Combustion, and Furnace Exit Gas Temperature on Tangentially Fired Pulverized Coal Boiler 350 MWe

    Low rank coal combustion of a tangential firing type boiler is influenced by time, temperature, and turbulence as well as the oxygen sufficiency of...
    Arief Laga Putra, Wawan Aries Widodo, Ardi Nugroho in Recent Advances in Renewable Energy Systems
    Conference paper 2022
  15. Implementation of Machine and Deep Learning Algorithms for Intrusion Detection System

    The intrusion detection system (IDS) is an important aspect of network security. This research article presents an analysis of machine and deep...
    Conference paper 2023
  16. Four-point bending test of high-early-strength high ductility concrete (HES-HDC): early mechanical behavior and toughness evaluation

    To investigate the early mechanical response of high-early-strength high ductility concrete (HES-HDC), a four-point bending test was conducted. The...

    Jiasheng Yang, Mingke Deng, ... Hongkan Fan in Archives of Civil and Mechanical Engineering
    Article 15 January 2024
  17. Mitigation of DDoS Attacks Using Honeypot and Firewall

    Harikrishnan, V. Sanket, H. S. Sahazeer, K. S. Vinay, Siddarth Honnavalli, Prasad B.A DDoS attack or distributed denial of service attack is an...
    V. Harikrishnan, H. S. Sanket, ... Prasad B. Honnavalli in Proceedings of Data Analytics and Management
    Conference paper 2022
  18. Boolean Family Exercises

    This chapter proposes sixteen exercises presented in a progressive manner and related to the methods belonging to the Boolean family (reliability...
    Jean-Pierre Signoret, Alain Leroy in Reliability Assessment of Safety and Production Systems
    Chapter 2021
  19. Numerical Simulation of the Effect of SA/PA on Combustion and Flow Characteristics in a Front-Rear Burner 400 MWe Boiler

    This paper will discuss computational fluid dynamics (CFD) modeling based on a 400 MWe boiler with the once-through tower type which is operated...
    Dimitra Meidina Kusnadi, Wawan Aries Widodo in Recent Advances in Mechanical Engineering
    Conference paper 2023
  20. Ensuring Tightness of Interference Fits

    Abstract

    The contact of parts with interference fits is considered. The strength and tightness of the fit mainly depends on the surface state. The...

    N. E. Kurnosov, A. V. Tarnopol’skiy, Yu. Y. Nakashidze in Russian Engineering Research
    Article 01 May 2023
Did you find what you were looking for? Share feedback.