Search alternatives:
pattern » patterns (Expand Search)
Showing 1,041 - 1,060 results of 2,064 for search 'network evaluation pattern', query time: 0.14s Refine Results
  1. 1041

    Distributed Abnormal Activity Detection in Smart Environments by Chengliang Wang, Qian Zheng, Yayun Peng, Debraj De, Wen-Zhan Song

    Published 2014-05-01
    “…Firstly, DetectingAct finds the normal activity patterns through duration-dependent frequent pattern mining algorithm (DFPMA), which adopts unsupervised learning instead of supervised learning. …”
    Get full text
    Article
  2. 1042

    Causally-Aware Reinforcement Learning for Joint Communication and Sensing by Anik Roy, Serene Banerjee, Jishnu Sadasivan, Arnab Sarkar, Soumyajit Dey

    Published 2025-01-01
    “…The next-generation wireless network, 6G and beyond, envisions to integrate communication and sensing to overcome interference, improve spectrum efficiency, and reduce hardware and power consumption. …”
    Get full text
    Article
  3. 1043
  4. 1044

    User-Independent Activity Recognition via Three-Stage GA-Based Feature Selection by Theresia Ratih Dewi Saputri, Adil Mehmood Khan, Seok-Won Lee

    Published 2014-03-01
    “…Advancement in wireless sensor networks gave birth to applications that can provide friendly and intelligent services based on the recognition of human activities. …”
    Get full text
    Article
  5. 1045

    On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol by Mouhannad Alattar, Françoise Sailhan, Julien Bourgeois

    Published 2013-06-01
    “…Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. …”
    Get full text
    Article
  6. 1046
  7. 1047
  8. 1048

    Incremental Adversarial Learning for Polymorphic Attack Detection by Ulya Sabeel, Shahram Shah Heydari, Khalil El-Khatib, Khalid Elgazzar

    Published 2024-01-01
    “…The employed attack quality analysis ensures that the adversarial atypical/polymorphic attacks generated through our system resemble original network attacks. We showcase the high performance of the IDS that we have proposed by training it using the CICIDS2017 and CICIoT2023 benchmark datasets and evaluating its performance against several atypical/polymorphic attack flows. …”
    Get full text
    Article
  9. 1049

    RACH Traffic Prediction in Massive Machine Type Communications by Hossein Mehri, Hani Mehrpouyan, Hao Chen

    Published 2025-01-01
    “…Traffic pattern prediction has emerged as a promising approach for efficiently managing and mitigating the impacts of event-driven bursty traffic in massive machine-type communication (mMTC) networks. …”
    Get full text
    Article
  10. 1050
  11. 1051
  12. 1052
  13. 1053
  14. 1054

    AERO: Adaptive Edge-Cloud Orchestration With a Sub-1K-Parameter Forecasting Model by Berend J. D. Gort, Godfrey M. Kibalya, Angelos Antonopoulos

    Published 2025-01-01
    “…Effective resource management in edge-cloud networks is crucial for meeting Quality of Service (QoS) requirements while minimizing operational costs. …”
    Get full text
    Article
  15. 1055

    Socio-demographic distribution and clinical profile of exotropia in India: Electronic medical records-driven big data analytics report by Sampada Kulkarni, Anthony Vipin Das, Ramesh Kekunnaya, Virender Sachdeva, Vivek Warkad

    Published 2025-05-01
    “…Purpose: To describe the demographics and clinical profile of exotropia from patient data obtained from a multi-tiered ophthalmology hospital network in India. Methods: This cross-sectional hospital-based study included the data of 2,664,906 patients presenting to the hospital network from August 1, 2010 to January 31, 2021. …”
    Get full text
    Article
  16. 1056

    Development mode and practice of fault-block oriented shale oil well in the second member of Funing Formation, Qintong Sag, Subei Basin by YAO Hongsheng,YUN Lu,ZAN Ling,ZHANG Longsheng,QIU Weisheng

    Published 2023-04-01
    “…For the multi-layer development of thick shale oil, the rectangular directional well pattern is conducive to the CO2 huff and puff, while the diamond reverse nine-spot well pattern is reasonable for the CO2 flooding. …”
    Get full text
    Article
  17. 1057

    Research on Intelligent Classification of Ultrasonic Phased Array Image of Welding Seam of Naval Gun Cradle by Wenjing Liu, Erqing Zhang, Jianguo Wang, Shaofeng Wang, Shunzhou Huang

    Published 2022-01-01
    “…The experimental results show that the advanced features obtained by the improved sparse autoencoder proposed in this paper are better than the original features in pattern recognition. This network can be used to more accurately identify the types of internal defects in the welds of naval gun mounts.…”
    Get full text
    Article
  18. 1058

    Ensemble of features for efficient classification of high-resolution remote sensing image by Gladima Nisia T, Rajesh S

    Published 2022-12-01
    “…The proposed system introduces two novel ideas, in its feature extraction implementation, namely (1) initialisation of filter values for the CNN and (2) change in local binary pattern feature extraction process. The experimental results are carried out with LISS IV Madurai image, and evaluation is done for the verification of the results. …”
    Get full text
    Article
  19. 1059

    To Study the Hydrological System and Watershed by Using Remote Sensing (RS) and Geographic Information System (GIS) in Kannad Taluka, Aurangabad District, MS, India by Eman Mohammed Garoon, Sultan Abduh Al-Horaibi, Mahadeo B. Mule

    Published 2022-01-01
    “…The basin’s mean bifurcation ratio is found to be 1.47 which indicates that the drainage network pattern is not much influenced by geological structures. …”
    Get full text
    Article
  20. 1060

    Improving cancer detection through computer-aided diagnosis: A comprehensive analysis of nonlinear and texture features in breast thermograms. by Hamed Khodadadi, Shima Nazem

    Published 2025-01-01
    “…The proposed method utilizes various machine learning algorithms, including Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Linear Discriminant Analysis (LDA), Pattern recognition Network (Pat net), and Fitting neural Network (Fit net), for classification. ten-fold cross-validation ensures robust performance evaluation. …”
    Get full text
    Article