Buscar
Mostrando ítems 101-110 de 110
Comunidades ou Coleccións correspondentes a súa consulta
Ítems correspondentes á súa consulta
Clustering techniques performance comparison for predicting the battery state of charge: A hybrid model approach
(Oxford University Press, 2024-05-09)
[Abstract] Batteries are a fundamental storage component due to its various applications in mobility, renewable energies and consumer electronics among others. Regardless of the battery typology, one key variable from a ...
Exploring the Efficacy of Binary Surveys versus Likert Scales in Assessing Student Perspectives Using Bayesian Analysis
(MDPI, 2024-05)
[Abstract] Likert-scale surveys are the undeniable protagonists of online evaluations. They ask the respondent to express their degree of agreement with a series of statements related to the development of a subject. In ...
Novel adaptive approach for anomaly detection in nonlinear and time-varying industrial systems
(Oxford University Press, 2024)
[Abstract] The present research describes a novel adaptive anomaly detection method to optimize the performance of nonlinear and time-varying systems. The proposal integrates a centroid-based approach with the real-time ...
A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport
(Wiley, 2024)
[Abstract]: One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems ...
A Fault-Detection System Approach for the Optimization of Warship Equipment Replacement Parts Based on Operation Parameters
(MDPI, 2023-03-23)
[Abstract] Systems engineering plays a key role in the naval sector, focusing on how to design, integrate, and manage complex systems throughout their life cycle; it is therefore difficult to conceive functional warships ...
A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport
(Wiley, 2024-02)
[Abstract]: One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems.
MitM attacks on internet of things systems ...