|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
Hosang Han and Jangwon Suh
The accurate prediction of soil contamination in abandoned mining areas is necessary to address their environmental risks. This study employed a combined model of machine learning and geostatistics to predict the spatial distribution of soil contaminatio...
ver más
|
|
|
|
|
|
Aliyye Kara, Ibrahim Eksin and Ata Mugan
The design optimization of structures can be conducted in either the time domain or the frequency domain. The frequency domain approach is advantageous compared to its time domain counterpart, especially if the degree of freedom is large, the objectives ...
ver más
|
|
|
|
|
|
Somayeh Shahrabadi, Telmo Adão, Emanuel Peres, Raul Morais, Luís G. Magalhães and Victor Alves
The proliferation of classification-capable artificial intelligence (AI) across a wide range of domains (e.g., agriculture, construction, etc.) has been allowed to optimize and complement several tasks, typically operationalized by humans. The computatio...
ver más
|
|
|
|
|
|
Nikola Andelic and Sandi Baressi ?egota
This investigation underscores the paramount imperative of discerning network intrusions as a pivotal measure to fortify digital systems and shield sensitive data from unauthorized access, manipulation, and potential compromise. The principal aim of this...
ver más
|
|
|