Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fuzzy logic
biblio
Implementation of Fuzzy Logic Control in Predictive Analysis and Real Time Monitoring of Optimum Crop Cultivation : Fuzzy Logic Control In Optimum Crop Cultivation
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
fuzzy set theory
Temperature distribution
Temperature control
Soil
security
Resiliency
resilience
pubcrawl
predictive analysis
optimum crop cultivation
optimisation
Monitoring
Metrics
Agriculture
fuzzy logic set
fuzzy logic network
fuzzy logic control
Fuzzy logic
fuzzy control
data science
Cyber Physical System
crops
Crop Production
Conferences
Cloud Computing
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
biblio
Network Parameter Analysis; ad hoc WSN for Security Protocol with Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:02pm
pubcrawl
wireless sensor networks
Wireless communication
unsecured network
telecommunication security
soft computing prediction tool
security protocol
security
Rogue Access Point detection
Rogue Access Point (RAP)
Resiliency
resilience
real-time systems
RAP detection
Ad hoc networks
Protocols
network parameter analysis
Monitoring
mobile devices
Metrics
Hidden Markov models
Fuzzy logic
fuzzy controller
Cyber Physical System
Conferences
Communication system security
ad hoc WSN
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
Constrained Interval Type-2 Fuzzy Classification Systems for Explainable AI (XAI)
Submitted by aekwall on Mon, 03/01/2021 - 5:01pm
xai
type-reduction step
output interval centroid
IT2
interval type-2 fuzzy logic
inherently interpretable structure
fuzzy logic systems
explainable type-2 fuzzy systems
explainable CIT2 classifiers
constrained interval type-2 fuzzy sets
constrained interval type-2 fuzzy classification systems
Constrained interval type-2
classification reliability
explainable artificial intelligence
Intelligent systems
Scalability
explainable AI
Artificial Intelligence
Switches
Linguistics
Fuzzy sets
Indexes
Generators
fuzzy set theory
Fuzzy logic
natural language
pattern classification
Shape
pubcrawl
Resiliency
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:42pm
Linguistics
Wireless Mesh Network Security
self-organized technology
self-configured technology
safe traffic adaptation model
safe traffic adaptation
queue length
performance efficiency
network traffic load
fuzzy framework
future queue state
explicit rate messages
queueing theory
Monitoring
wireless mesh networks
delays
control systems
fuzzy set theory
Fuzzy logic
internet
Metrics
composability
pubcrawl
Resiliency
real-time systems
telecommunication traffic
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
fuzzy technologies
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
differential equations
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
Trojan horses
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
cyberattack
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
Fuzzy Keyword Sets
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Indexes
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
Cloud Computing
fuzzy set theory
Fuzzy logic
Data protection
query processing
Metrics
pubcrawl
Resiliency
data encryption
encryption
data confidentiality
Cryptography
authorisation
Keyword search
Servers
Scalability
biblio
Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network
Submitted by aekwall on Mon, 01/18/2021 - 11:33am
neural nets
Fuzzy Cryptography
privacy preserving techniques
health sectors
fuzzy logic membership functions
autoencoder
privacy breach
stored data
hospitals
health care
Biological neural networks
Fuzzy logic
security
Autoencoder Neural Network
Metrics
privacy
pubcrawl
Resiliency
Organizations
electronic health records
data privacy
Cryptography
Scalability
biblio
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
optimisation
Fuzzy Cryptography
YARA rule conditions
rule optimisation process
Performance Optimisation
YARA rules
Fuzzy Hashing
fuzzy rules
Fuzzy sets
fuzzy set theory
Fuzzy logic
Malware Analysis
Scalability
pattern matching
optimization
standards
Metrics
Cryptography
Ransomware
pubcrawl
Resiliency
invasive software
malware
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »