S Oladipo, Y Sun, A Amole - IEEE Access, 2023 - ieeexplore.ieee.org
Electricity is undeniably one of the most crucial building blocks of high-quality life all over the world. Like many other African countries, Nigeria is still grappling with the challenge of the …
K Demertzis, L Iliadis - E-Democracy, Security, Privacy and Trust in a …, 2014 - Springer
The evolution of network services is closely connected to the understanding and modeling of their corresponding traffic. The obtained conclusions are related to a wide range of …
BN Haqiqi, R Kurniawan - Media Statistika, 2015 - ejournal.undip.ac.id
Abstract Fuzzy C-Means (FCM) is one of the most frequently used clustering method. However FCM has some disadvantages such as number of clusters to be prespecified and …
In this paper, we propose a fuzzy clustering model to find the proper cluster structures from a dataset used for intrusion detection. Since, genetic algorithm is an effective technique to …
WY Hsu - Telematics and Informatics, 2017 - Elsevier
A novel clustering-based compression work connected to cloud databases is proposed for the applications of telemedicine and long-term care in this study, where the goal is to …
WY Hsu - Telematics and Informatics, 2015 - Elsevier
This study proposes a novel segmentation-based compression scheme for new frontiers of telemedicine in telecommunication, where the aim is to improve the information transfer and …
ABSTRACT Intrusion Detection System (IDS) is one of the component that take part in the system defence, to identify abnormal activities happening in the computer system …
WY Hsu - Telematics and Informatics, 2015 - Elsevier
The study proposes a novel brain–computer interface scheme for the next frontier of telemedicine in human–computer interaction, where the goal is to improve the interactions …
This book entitled Computation, Cryptography, and Network Security brings together a broad variety of mathematical methods and theories with several applications from a number …