Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Vertical Underwater Molecular Communications via Buoyancy: Gaussian Velocity Distribution of Signal
Submitted by aekwall on Mon, 12/21/2020 - 1:29pm
reliable delay-tolerant data link
downwards channels
Gaussian velocity spatial distribution
heavy propagation loss
high capacity data rates
Liquids
long range underwater vertical communication
MCvB channel
modulated symbols
molecular clusters
particle image velocimetry
dominant propagation force
sequential puffs
sequential symbols
sonar based carriers
statistical characteristics
statistical distribution
turbulent diffusion
underwater
velocity profile
vertical underwater molecular communications
viscous diffusion
acoustic coupling
Resiliency
Human behavior
pubcrawl
Reliability
Mathematical model
Stress
molecular communication
molecular communication (telecommunication)
telecommunication network reliability
Chemicals
Scalability
underwater acoustic communication
physical security
statistical distributions
defence
Buoyancy
buoyancy channel
buoyancy forces
covert delay-tolerant data link
current optical based carriers
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
Design of Self Tuning PID Controller Based on Competitional PSO
Submitted by aekwall on Mon, 12/14/2020 - 12:39pm
PID controller form
designed PID controller
general PSO method
modified velocity updating formula
non-linear system
nonlinear PID controller design task
nonlinear system PID controller design
optimal PID controller
optimization direction
particle swarm optimization-based optimization algorithm
controller functioning
PID gains
position updating formula
running game
running match
searching process
self tuning PID controller
self-adjusting systems
velocity calculating
Sociology
pubcrawl
composability
simulation
particle swarm optimisation
Swarm Intelligence
optimization
particle swarm optimization
PSO
Task Analysis
Statistics
Mathematical model
Compositionality
control system synthesis
PID controller
three-term control
nonlinear control systems
competitional PSO
biblio
Analysis of Human Behaviors in Real-Time Swarms
Submitted by aekwall on Mon, 12/14/2020 - 12:37pm
Brain modeling
time-varying behaviors
social organisms
real-time swarm
Organisms
human swarms
Collective Intelligence
behavioral dynamics
Human Swarming
human groups
artificial swarm intelligence
human behaviors
real-time systems
behavioural sciences computing
Decision Making
Compositionality
Artificial Intelligence
human computer interaction
Mathematical model
particle swarm optimization
Swarm Intelligence
composability
pubcrawl
biblio
Standardization of Gram Matrix for Improved 3D Neural Style Transfer
Submitted by grigby1 on Fri, 12/11/2020 - 2:53pm
Solid modeling
Metrics
neural net architecture
neural style transfer
pubcrawl
resilience
Resiliency
Scalability
Shape
Mathematical model
standardization
standardized Gram matrix based loss function
stereo image processing
style similarity
Three-dimensional displays
Two dimensional displays
voxel
2D binary monochromatic images
learning (artificial intelligence)
image representation
image colour analysis
Image color analysis
image classification
convolutional neural network architecture
convolutional neural nets
computational geometry
color information
classifier network training
binary models
binary 3D voxel representation
3D voxelized objects
3D neural style transfer
3D geometries
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by grigby1 on Fri, 12/11/2020 - 2:33pm
invasive software
structure analysis
Silicon
security
Resiliency
resilience
pubcrawl
privacy
mobile computing
Metrics
Mathematical model
malware class
malware apps
Malware Analysis
malware
Analytical models
Human behavior
hand-refined API-based feature graph
graph theory
Feature Selection
feature extraction
deep learning
CNN-based classifier
application program interfaces
API-based feature graph classification
API features
Android malware classification
Android malware apps
Android malware
Android (operating system)
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
Predictive models
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
MEC-based IoT systems
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
IoT systems
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
alternate direction method of multipliers
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
biblio
Distribution Grid State Assessment for Control Reserve Provision Using Boundary Load Flow
Submitted by grigby1 on Wed, 12/02/2020 - 2:04pm
Probabilistic logic
load uncertainties
Mathematical model
Power cables
power generation
power grids
power system parameter estimation
power system security
power system stability
power system state estimation
load forecasting
pubcrawl
resilience
Resiliency
Scalability
solar power plants
solar power stations
standard load profile
wind power plants
frequency stability
boundary load flow method
control reserve
control reserve provision
control reserve supply
coupled congestion control
distributed power generation
distribution grid state assessment
ex ante evaluation
forecasting loads
boundary load flow
future grid state identification
grid congestions
grid parameter estimation
grid parameters
grid state assessment
grid state identification
Jacobian matrices
Load flow
biblio
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
pubcrawl
Training
testing
Support vector machines
security of data
Resiliency
resilience
RBF-based multistage autoencoders
RBF training
RBF
radial basis function networks
radial basis function
auto-encoders
MATLAB2018
MATLAB
Mathematical model
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
IDS attacks
IDS
Feature Selection
feature extraction
composability
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »