Buscar
Mostrando ítems 1-7 de 7
Fuel cell hybrid model for predicting hydrogen inflow through energy demand
(MDPI, 2019-11-10)
[Abstract]: Hydrogen-based energy storage and generation is an increasingly used technology, especially in renewable systems because they are non-polluting devices. Fuel cells are complex nonlinear systems, so a good model ...
Bioinspired hybrid model to predict the hydrogen inlet fuel cell flow change of an energy storage system
(MDPI, 2019-11-07)
[Abstract]: The present research work deals with prediction of hydrogen consumption of a fuel cell in an energy storage system. Due to the fact that these kind of systems have a very nonlinear behaviour, the use of traditional ...
Gaining deep knowledge of Android malware families through dimensionality reduction techniques
(Oxford University Press, 2019-04)
[Abstract] This research proposes the analysis and subsequent characterisation of Android malware families by means of low dimensional visualisations using dimensional reduction techniques. The well-known Malgenome data ...
Short-Term Energy Demand Forecast in Hotels Using Hybrid Intelligent Modeling
(MDPI, 2019)
[Abstract] The hotel industry is an important energy consumer that needs efficient energy management
methods to guarantee its performance and sustainability. The new role of hotels as prosumers
increases the difficulty ...
A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport
(Wiley, 2024)
[Abstract]: One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems ...
A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport
(Wiley, 2024-02)
[Abstract]: One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems.
MitM attacks on internet of things systems ...