Search
Search Results
-
Hybrid Data-Driven Machine Learning Framework for Determining Prestressed Concrete Losses
This study presents a hybrid data-driven machine learning framework utilizing Bayesian regularization-based artificial neural network (ANN) and...
-
Darknet Traffic Detection Using Histogram-Based Gradient Boosting
The network security sector has observed a rise in severe attacks emanating from the darknet or encrypted networks in recent years. Network intrusion... -
Demonstration of MITM Attack in Synchrophasor Network Using MAC Spoofing
Communication is critical for power system operation and control. Data transfer via digital means is vulnerable to security and privacy concerns.... -
Influence of the Gradual Ignition of a Powder in a Gun and of its Nonstationary and Erosion Burning on the Internal Ballistics of a Gunshot
A mathematical simulation of the internal ballistics of a shot from a gun, depending on the design of the charge of the gun, has been performed. A...
-
Design and Implementation of a Quantitative Network Health Monitoring and Recovery System
A network health monitoring system focuses on the quantification of the network’s health by taking into account various security flaws, leaks, and...
-
CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model
Cloud computing has become the most significant technology in today’s world as it provides several services including physical resources and... -
A Detailed Analysis of the CIDDS-001 and CICIDS-2017 Datasets
The contributions of this paper are threefold—(i) to provide a detailed analysis of two benchmark datasets CIDDS-001 and CICIDS-2017, (ii) to... -
SAPV Sizing Optimization: A Numerical Iterative Method Using LTE Base Station Profile in SA
The quest for a green renewable energy source in replacement of conventional energy such as fossil fuel, diesel generator, or electric grid has taken... -
Domain Knowledge-Aided Explainable Artificial Intelligence
The lack of human-friendly explanations from Artificial Intelligence (AI)—based decisions is a major concern for high stake applications. Towards... -
Complex for Research of Power and Speed Losses in Tires of the Car, at Their Rolling on Rollers of the Diagnostic Stand
The article presents the calculation of the efficiency of an elastic tire of an automobile wheel. Its influence on the errors associated with the... -
Using Recursive Feature Elimination and Fisher Score with Convolutional Neural Network for Identifying Port Scan Attempts
Port scanning is a frequently used service in the internet with its usage done by both network defenders as well as attackers. Detecting Port scan... -
A Mathematical Optimization Framework for Managing the Renewable Energy to Attain Maximum Power
Renewable energy generation is a critical component of society’s long-term sustainability, and numerous energy sources, including biogas, solar,...
-
Digitization of the Mechanical Articulator: Virtual Articulator
This study presents the digitalization of the dental articulator, which is a device used by dentists as a replica of the patient’s mouth. For this... -
Numerical Study Effect Using Low Rank Coal on Flow Characteristics, Combustion, and Furnace Exit Gas Temperature on Tangentially Fired Pulverized Coal Boiler 350 MWe
Low rank coal combustion of a tangential firing type boiler is influenced by time, temperature, and turbulence as well as the oxygen sufficiency of... -
Implementation of Machine and Deep Learning Algorithms for Intrusion Detection System
The intrusion detection system (IDS) is an important aspect of network security. This research article presents an analysis of machine and deep... -
Four-point bending test of high-early-strength high ductility concrete (HES-HDC): early mechanical behavior and toughness evaluation
To investigate the early mechanical response of high-early-strength high ductility concrete (HES-HDC), a four-point bending test was conducted. The...
-
Mitigation of DDoS Attacks Using Honeypot and Firewall
Harikrishnan, V. Sanket, H. S. Sahazeer, K. S. Vinay, Siddarth Honnavalli, Prasad B.A DDoS attack or distributed denial of service attack is an... -
Boolean Family Exercises
This chapter proposes sixteen exercises presented in a progressive manner and related to the methods belonging to the Boolean family (reliability... -
Numerical Simulation of the Effect of SA/PA on Combustion and Flow Characteristics in a Front-Rear Burner 400 MWe Boiler
This paper will discuss computational fluid dynamics (CFD) modeling based on a 400 MWe boiler with the once-through tower type which is operated... -
Ensuring Tightness of Interference Fits
AbstractThe contact of parts with interference fits is considered. The strength and tightness of the fit mainly depends on the surface state. The...