Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Temperature distribution
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
uncertainty handling
trustworthy measure
temperature sensor data
numerical data
multimodal
IoT sensor data
IoT image sensor data
image sensors
image sensor data
DST framework
Dempster-Shafer Theory
complementary multimodal data
authentic forged image data
Temperature distribution
Temperature sensors
security of data
Numerical models
inference mechanisms
Internet of Things applications
sensor fusion
trustworthiness
trust
composability
pubcrawl
learning (artificial intelligence)
Data models
Trusted Computing
IoT applications
Internet of Things
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
MVP mode
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
remote monitoring
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
computerised monitoring
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
security
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
biblio
Demagnetization Modeling Research for Permanent Magnet in PMSLM Using Extreme Learning Machine
Submitted by aekwall on Mon, 02/24/2020 - 9:54am
permanent magnets (PM)
Fitting
linear modeling method
linear synchronous motors
machine theory
magnetic distribution
permanent magnet motors
permanent magnet synchronous linear motor
permanent magnet synchronous linear motor (PMSLM)
extreme learning machine (ELM)
PM characteristics
PMSLM
polynomial modeling method
temperature 293.0 K to 298.0 K
temperature 300.0 degC
temperature demagnetization modeling method
Temperature distribution
Data models
extreme learning machine
ELM
Demagnetization
Permanent magnets
demagnetisation
finite element analysis
remanence
Compositionality
polynomials
Temperature measurement
power engineering computing
machine learning algorithm
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
A Novel Hybrid Delay Based Physical Unclonable Function Immune to Machine Learning Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
Monitoring
wireless sensor networks
Temperature sensors
Temperature measurement
Temperature distribution
Scalability
Ring oscillators
Resiliency
resilience
pubcrawl
NIST
Adversary Models
Modeling Attacks
Metrics
Hybrid PUF
Humidity
Human behavior
Hardware Security
FPGA
arbiter PUF
Agriculture
biblio
Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies
Submitted by BrandonB on Thu, 04/30/2015 - 12:16pm
distributed denial-of-service attacks
thermal properties
Temperature distribution
Servers
server downtime prevention
power aware computing
network simulation
network management protocols
Monitoring
HVAC systems
HVAC
heating-ventilation-and-air-conditioning systems
Heating
Cloud Computing
defense strategies
DDoS Attack
Data models
data center meltdown
Data center communications
Cooling
computer network security
computer network management
Computer crime
computer centres
cloud services
« first
‹ previous
1
2