-
201
A feature selection algorithm for anomaly detection in grid environment using k-fold cross validation technique
Published 2017“…An Intrusion Detection System (IDS) seeks to identify unauthorized access to computer systems’ resources and data. The spreading of a data set size, in number of records as well as of attributes, as trigger the development of a number of big data platforms as well as parallel data analysis algorithms. …”
Conference or Workshop Item -
202
Temporal variation of bacterial community and nutrients in Tibetan glacier snowpack
Published 2022-04-01Get full text
Article -
203
Evidence for crustal magma chamber associated with metallogeny based on P-wave velocities, South China
Published 2022-11-01Get full text
Article -
204
Editorial: Patterns, functions, and processes of alpine grassland ecosystems under global change
Published 2022-10-01Get full text
Article -
205
Adaptive cell selection algorithm for balancing cell loads in 5G heterogeneous networks
Published 2023-06-01“…Some cells have excessive user presence where the competition for system resources is high, while other cells have low user presence where system resources are not fully utilised. …”
Get full text
Article -
206
Shots segmentation-based optimized dual-stream framework for robust human activity recognition in surveillance video
Published 2024-03-01“…First, a shots segmentation module is introduced in the proposed framework to efficiently utilize the surveillance system resources by enhancing the lowlight video stream and then it detects salient video frames that consist of human. …”
Get full text
Article -
207
-
208
Strategic vector of economic dynamics of an industrial region
Published 2014-03-01“…«A regional institutional contour of new industrialization,» a new concept is introduced. System resources of its realization possible on the basis of innovative components are defined. …”
Get full text
Article -
209
Optimal Search Strategy of Low-Altitude Target for Airborne Phased Array Radar Using Digital Elevation Model
Published 2022-01-01“…The search for low-altitude targets becomes a more challenging task for airborne phased array radar, due to the limited system resources and serious ground clutter. In this article, an optimal search strategy using the digital elevation model (DEM) is proposed to allow for a fast and high-probability searches for low-altitude targets. …”
Get full text
Article -
210
Robust adaptive event‐triggered ILC scheme design for discrete‐time non‐repetitive nonlinear systems
Published 2024-01-01“…The designed robust adaptive ET‐ILC algorithm not only guarantees perfect learning convergence in the iteration domain but also contributes to saving the system resources. The effectiveness of the presented method is demonstrated by virtue of the rigorous theoretical analysis and the illustrative simulation examples.…”
Get full text
Article -
211
Research on Fault-Tolerant Flight Control Computer for High Altitude Long Endurance Unmanned Air Vehicle
Published 2018-08-01“…The experimental results show that the system meets the UAV's demand of high reliability, low cost and good expansibility, maximize the utilization of system resources and effectively improve the fault tolerant capability of airborne computer and the reliability of sensor subsystem. …”
Get full text
Article -
212
Output from Statistical Predictive Models as Input to eLearning Dashboards
Published 2015-06-01“…The article’s brief introduction to statistical predictive models sets the stage for a description of the messaging system. Resources and methods needed to develop and implement the system are discussed.…”
Get full text
Article -
213
Autoscaling Pods on an On-Premise Kubernetes Infrastructure QoS-Aware
Published 2022-01-01“…The main contribution of this proposal is its dynamic autoscaling capabilities to adjust system resources to the current workload while improving QoS.…”
Get full text
Article -
214
Innovative approaches to biologic development on the trail of CT-P13: biosimilars, value-added medicines, and biobetters
Published 2021-01-01“…Relative to CT-P13 IV, CT-P13 SC offers clinical benefits in terms of pharmacokinetics, with comparable efficacy, safety, and immunogenicity, as well as increased convenience for patients and reduced demands on healthcare system resources. As was once the case for biosimilars, nomenclature and regulatory pathways for innovative biologics require clarification to support their uptake and ultimately benefit patients.…”
Get full text
Article -
215
Parrondo's paradox in network communication: A routing strategy
Published 2024-02-01“…The throughput and latency bottleneck in accessing system resources is prevalent in all communication systems. …”
Get full text
Article -
216
Lightweight Cryptography for the Encryption of Data Communication of IoT Devices
Published 2021-10-01“…In this paper, we present a method of reducing the volume of data transmission between a server and an IoT device, focusing on the bandwidth, transmission security, and system resources of the IoT device. The required reduction is achieved by data compression and replacing the SSL/TLS cryptographic protocol with lightweight cryptography based on the Vernam cipher principle. …”
Get full text
Article -
217
Parrondo's paradox in network communication: a routing strategy
Published 2024“…The throughput and latency bottleneck in accessing system resources is prevalent in all communication systems. …”
Get full text
Journal Article -
218
Matching fingerface based on area under the highest peaks curve
Published 2010“…Biometric is one of the ways, by mean of using human characteristics in accessing system resources. Fingerprint and face can be used to secure systems, because fingerprint is a unique, un-repeatable. …”
Get full text
Conference or Workshop Item -
219
A data analysis for intrusion detection using principal component
Published 2004“…PCA is then employed to reduce the high dimensional data vectors and thus, detection is handled in a low dimensional space with high efficiency and low use of system resources. Our experiments with the KDD Cup 99 dataset, although not yet completed, have shown that this approach is promising in terms of detection accuracy. …”
Conference or Workshop Item -
220
A methodology to detect intrusion using system call based on discriminant analysis
Published 2003“…An intrusion detection system seeks to identify unauthorized access to computer systems' resources and data. Many methods have been proposed to detect intrusion; for example, the pattern matching method to finding intrusion by matching sample data to know intrusive patterns and the statistical approach to detect intrusion from normal activities at the user level or system level. …”
Conference or Workshop Item