|
|
|
Tala Talaei Khoei and Naima Kaabouch
Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such as ...
ver más
|
|
|
|
|
|
|
Tala Talaei Khoei and Naima Kaabouch
Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect these a...
ver más
|
|
|
|
|
|
|
Aishwarya Bakshi,Amir Talaei-Khoei,Pradeep Ray,Terje Solvoll
Whenever an unexpected or exceptional situation occurs, complying with the existing policies may not be possible. The main objective of this work is to assist individuals and organizations to decide in the process of deviating from policies and performin...
ver más
|
|
|
|
|
|
|
Suchada Vichitvanichphong,Amir Talaei-Khoei,Donald Kerr,Amir Hossein Ghapanchi,Bridie Scott-Parker
In many situations, driving is essential for senior citizens to maintain their independent lifestyle. A systematic literature review was conducted that summarized the age-related physical, visual and cognitive functional declines and their associated ris...
ver más
|
|
|
|
|
|
|
Suchada Vichitvanichphong,Amir Talaei-Khoei,Donald Kerr,Amir Hossein Ghapanchi
The main objective of this paper is to explore the potentials of assistive technologies to support seniors? independent living. The work looks at two salient aspects of utilizing technologies for elderly, namely direct support and empowering technologies...
ver más
|
|
|
|
|
|
|
J. Panahandeh, M. Valizadeh, M. Khosroshahly, A.P. Yermishin, F.R. Khoei, N. Mahna
Pág. 348 - 353
|
|
|
|
|
|
|
Khoei, A. R. Bakhshiani, A. Mofid, M.
Pág. 521 - 534
|
|
|
|