Search alternatives:
pattern » patterns (Expand Search)
Showing 481 - 500 results of 2,064 for search 'network evaluation pattern', query time: 0.22s Refine Results
  1. 481

    Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations by Phuc Hao do, Tran Duc Le, Truong Duy Dinh, van Dai Pham

    Published 2025-01-01
    “…The rapid expansion of devices on the Internet of Things (IoTs) has led to a significant rise in IoT botnet attacks, creating an urgent need for advanced detection and classification methods. This study aims to evaluate the effectiveness of Kolmogorov-Arnold Networks (KANs) and their architectural variations in classifying IoT botnet attacks, comparing their performance with traditional machine learning and deep learning models. …”
    Get full text
    Article
  2. 482

    Forecasting Residential Energy Consumption with the Use of Long Short-Term Memory Recurrent Neural Networks by Zurisaddai Severiche-Maury, Carlos Eduardo Uc-Rios, Wilson Arrubla-Hoyos, Dora Cama-Pinto, Juan Antonio Holgado-Terriza, Miguel Damas-Hermoso, Alejandro Cama-Pinto

    Published 2025-03-01
    “…This dual structure enhances accuracy by capturing both device-specific consumption patterns and overall household energy use, facilitating informed decision-making at multiple levels. …”
    Get full text
    Article
  3. 483

    Penetration Testing and Machine Learning-Driven Cybersecurity Framework for IoT and Smart City Wireless Networks by Tamara Zhukabayeva, Zulfiqar Ahmad, Aigul Adamova, Nurdaulet Karabayev, Yerik Mardenov, Dina Satybaldina

    Published 2025-01-01
    “…Anomalies were identified using an optimized Isolation Forest model, revealing patterns such as unusual activity involving the Tenda_476300 WiFi network. …”
    Get full text
    Article
  4. 484

    vBerlinV2N: Recreating a Cellular Network Measurement Campaign With Simulations by Christian L. Vielhaus, Mauri Seidel, Vincent Latzko, Alexander Grob, Peter Sossalla, Martin Reisslein, Frank H. P. Fitzek

    Published 2025-01-01
    “…System-level simulations play a crucial role in evaluating the behaviors of cellular networks, yet most studies rely on synthetic simulation scenarios rather than reproducing realistic network deployments. …”
    Get full text
    Article
  5. 485

    Integration of Artificial Neural Network Regression and Principal Component Analysis for Indoor Visible Light Positioning by Negasa Berhanu Fite, Getachew Mamo Wegari, Heidi Steendam

    Published 2025-02-01
    “…Leveraging machine learning techniques, particularly regression-based artificial neural networks (ANNs), offer a promising alternative. ANNs excel at modeling the intricate relationships within data, making them well-suited for handling the complex dynamics of indoor lighting environments. …”
    Get full text
    Article
  6. 486

    Dietary habits and complex food relations in Northwest China: a population-based network analysis by Xinhua Wang, Duolao Wang, Shaonong Dang, Baibing Mi, Hong Yan, Yuhong Zhang, Yijun Kang, Jianghong Dai, Jing Hui, Samuel Chacha, Huang Yan, Zongkai Li, Jiaxin Cai, Fuchang Ma

    “…The staple food-related food network indicated that the intake of rice, whole grains and beans, and potatoes was positively correlated with the intake of most other foods, while intake of wheat was negatively correlated with foods of animal source of food, milk and dairy products.Conclusions Northwest China’s diet exhibits irrational patterns, highlighting the importance of assessing overall dietary patterns in nutritional evaluation.…”
    Get full text
    Article
  7. 487

    Resilience evolution and optimization strategies of ecological networks in the Three Gorges Reservoir Area: A scenario-based simulation approach by Haohua Wang, Lulu Zhou, Kangchuan Su, Yun Zhou, Qingyuan Yang

    Published 2025-12-01
    “…This study focuses on the Three Gorges Reservoir Area (TGRA), addressing human-land relationship conflicts by constructing an EN system and analyzing its spatiotemporal evolution from 2001 to 2023. To evaluate network resilience, this study employs node attack simulation methods, we dynamically assessed EN resilience through four functional and structural indicators. …”
    Get full text
    Article
  8. 488
  9. 489
  10. 490

    An Evaluation and Implementation of Rule-Based Home Energy Management System Using the Rete Algorithm by Tomoya Kawakami, Naotaka Fujita, Tomoki Yoshihisa, Masahiko Tsukamoto

    Published 2014-01-01
    “…The Rete algorithm is a typical pattern matching algorithm for IF-THEN rules. Currently, we have proposed a rule-based Home Energy Management System (HEMS) using the Rete algorithm. …”
    Get full text
    Article
  11. 491
  12. 492

    Reinforced liquid state machines—new training strategies for spiking neural networks based on reinforcements by Dominik Krenzer, Martin Bogdan, Martin Bogdan, Martin Bogdan

    Published 2025-05-01
    “…IntroductionFeedback and reinforcement signals in the brain act as natures sophisticated teaching tools, guiding neural circuits to self-organization, adaptation, and the encoding of complex patterns. This study investigates the impact of two feedback mechanisms within a deep liquid state machine architecture designed for spiking neural networks.MethodsThe Reinforced Liquid State Machine architecture integrates liquid layers, a winner-takes-all mechanism, a linear readout layer, and a novel reward-based reinforcement system to enhance learning efficacy. …”
    Get full text
    Article
  13. 493

    Integrated deep network model with multi-head twofold attention for drug–target interaction prediction by Angelin Jeba P, Tamilpavai G

    Published 2025-06-01
    “…The MHTA mechanism enhances the model’s ability to focus on different aspects of drug and target features independently, effectively capturing intricate interaction patterns. Dense embeddings generated from input representations are refined using recurrent layers for long-range dependencies and convolutional layers for local patterns. …”
    Get full text
    Article
  14. 494

    Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated Learning by Milad Rahmati

    Published 2025-03-01
    “…In this research, we introduce a real-time fraud detection framework that combines Adaptive Graph Neural Networks (GNNs) and Federated Learning (FL) to overcome these limitations. …”
    Get full text
    Article
  15. 495

    Enhanced Network Traffic Classification Using Bayesian-Optimized Logistic Regression and Random Forest Algorithm by Manisankar Sannigrahi, R. Thandeeswaran

    Published 2025-01-01
    “…Compared to other machine learning algorithms, the proposed models demonstrate superior performance in balancing accuracy, computational efficiency, and detection speed, making them ideal for real-time network security applications. This approach’s flexibility to adapt to various network conditions and datasets ensures consistent optimal performance as traffic patterns change.…”
    Get full text
    Article
  16. 496

    Supervised Anomaly Detection in Univariate Time-Series Using 1D Convolutional Siamese Networks by Ayan Chatterjee, Vajira Thambawita, Michael A. Riegler, Pal Halvorsen

    Published 2025-01-01
    “…The model uses a contrastive loss function to compare input sequences and adjusts network weights iteratively during training to recognize intricate patterns. …”
    Get full text
    Article
  17. 497

    ChaMTeC: CHAnnel Mixing and TEmporal Convolution Network for Time-Series Anomaly Detection by Ibrahim Delibasoglu, Deniz Balta, Musa Balta

    Published 2025-05-01
    “…Time-series anomaly detection is a critical task in various domains, including industrial control systems, where the early detection of unusual patterns can prevent system failures and ensure operational reliability. …”
    Get full text
    Article
  18. 498

    Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm by Hassan Ghaedi, Seyed Reza Kamel Tabbakh, Reza Ghaemi

    Published 2022-12-01
    “…Extensive research studies have been done to detect electricity theft by analyzing customer consumption patterns. Today, one of the most widely used methods is convolutional neural networks (CNNs). …”
    Get full text
    Article
  19. 499

    Intrusion Alert Analysis Method for Power Information Communication Networks Based on Data Processing Units by Rui Zhang, Mingxuan Zhang, Yan Liu, Zhiyi Li, Weiwei Miao, Sujie Shao

    Published 2025-06-01
    “…Finally, the suffix tree models attack activities, capturing key behavioral paths of high-severity alerts and identifying attacker patterns. Experimental evaluations on the CPTC-2017 and CPTC-2018 datasets validate the proposed method’s effectiveness in reducing alert redundancy, extracting critical attack behaviors, and constructing attack activity sequences. …”
    Get full text
    Article
  20. 500

    Moanna: Multi-Omics Autoencoder-Based Neural Network Algorithm for Predicting Breast Cancer Subtypes by Richard Lupat, Rashindrie Perera, Sherene Loi, Jason Li

    Published 2023-01-01
    “…We evaluated our use of Autoencoder against other dimensionality reduction techniques and demonstrated its superiority in learning patterns associated with breast cancer subtypes. …”
    Get full text
    Article