MHL Louk, BA Tama - Expert Systems with Applications, 2023 - Elsevier
The mission of an intrusion detection system (IDS) is to monitor network activities and assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …
CN Wang, FC Yang, VTT Nguyen, NTM Vo - Micromachines, 2022 - mdpi.com
In this study, we proposed a novel approach to improve centrifugal pump performance with regard to the pump head, pump efficiency, and power. Firstly, to establish constraints, an …
CSK Dash, AK Behera, S Dehuri, A Ghosh - Decision Analytics Journal, 2023 - Elsevier
An outlier is a datum that is far from other data points in which it occurs. It can have a considerable impact on the output. Therefore, removing or resolving it before the analysis is …
S Sharma, V Kumar, K Dutta - Internet of Things and Cyber-Physical …, 2024 - Elsevier
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network …
Abstract In the Internet of Things (IoT), the data that are sent via devices are sometimes unrelated, duplicated, or erroneous, which makes it difficult to perform the required tasks …
Many intrusion detection algorithms that use optimization have been developed and are commonly used to detect intrusions. The process of selecting features and the parameters of …
Abstract Machine learning (ML) is a subfield of Artificial Intelligence (AI) that contributes to the development of systems that can learn from previous data, spot patterns, and make …
Exam proctoring is a hectic task ie, the monitoring of students' activities becomes difficult for supervisors in the examination rooms. It is a costly approach that requires much labor. Also …
In the recent days all the digital devices including devices used in Healthcare, Personal Digital Assistance etc. are connected to the network, consequently data is exposed to …