Search
Now showing items 4131-4140 of 5122
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ...
Labor Induction failure prediction using Gabor filterbanks and Center Symmetric Local Binary Patterns
(IEEE, 2018)
Labor induction is defined as the artificial stimulation of uterine contractions aimed to induce vaginal birth. Occurring in about 20% of pregnancies labor induction has become one the most commonly practiced procedures ...
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Labor Induction failure prediction based on B-Mode Ultrasound Image Processing using Multiscale Local Binary Patterns
(IEEE, 2016)
Labor induction is defined as the artificial onset of labor for the purpose of vaginal birth. Cesarean section is one of the potential risks of labor induction as it occurs in about 20% of the inductions. A ripe cervix ...
Uncertainty-aware Robustness Assessment of Industrial Elevator Systems
(ACM, 2022)
Industrial elevator systems are commonly used software systems in our daily lives, which operate in uncertain environments such as unpredictable passenger traffic, uncertain passenger attributes and behaviors, and hardware ...
Data‐Driven Low‐Frequency Oscillation Event Detection Strategy for Railway Electrification Networks
(MDPI, 2023)
Low-frequency oscillations (LFO) occur in railway electrification systems due to the incorporation of new trains with switching converters. As a result, the increased harmonic content can cause catenary stability problems ...
Spectrum-based feature localization for families of systems
(Elsevier, 2022)
In large code bases, locating the elements that implement concrete features of a system is challenging. This information is paramount for maintenance and evolution tasks, although not always explicitly available. In this ...
Measurement based Tapped Delay Line Model for Train-to-Train Communications
(IEEE, 2022)
Train-to-train (T2T) communication is proposed as an auxiliary safety-guaranteed measure for railway communications. Vehicular communication standards have been supporting railway use cases and T2T communications. It is ...
A Case Study of Entrepreneurial Intent Among Students of the Primary Education Degree in the Basque Country and the Performance of Education Faculties
(Richtmann, 2022)
Entrepreneurship is a key competence for anyone intending to be an active citizen and obtain employment. Entrepreneurial education is therefore essential at all levels of education and in every field, not only in business ...
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
(Springer, 2023)
Industrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. A malicious and successful attack against these ...