Results 21 to 30 of about 616,005 (189)
From a Domain Analysis to the Specification and Detection of Code and Design Smells [PDF]
Code and design smells are recurring design problems in software systems that must be identified to avoid their possible negative consequences\ud on development and maintenance.
Duchien, Laurence +4 more
core +4 more sources
Data-Aided Versus Blind Single-Carrier Coherent Receivers
Fiber-optic research in signal processing for the first generation of coherent communication systems was dominated by receivers with blind adaptation. Next-generation systems will require a scalable and modular design for higher order modulation formats.
Maxim Kuschnerov +8 more
doaj +1 more source
Implementation and Evaluation of Novel Buildstyles in Fused Deposition Modeling (FDM) [PDF]
Previous investigations have shown that the optimization of extrusion dynamics in .conjunction with the buildstyle pattern is of paramount importance to increase part quality in Fused Deposition Modeling (FDM).
Jayal, Anshu Dhar +2 more
core +1 more source
Inline Detection of DGA Domains Using Side Information
Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a
Raaghavi Sivaguru +4 more
doaj +1 more source
Applications of Artificial Intelligence Algorithms in the Energy Sector
The digital transformation of the energy sector toward the Smart Grid paradigm, intelligent energy management, and distributed energy integration poses new requirements for computer science.
Hubert Szczepaniuk +1 more
doaj +1 more source
Detecting algorithmically generated malicious domain names
Recent Botnets such as Conficker, Kraken and Torpig have used DNS based “domain fluxing” for command-and-control, where each Bot queries for existence of a series of domain names and the owner has to register only one such domain name. In this paper, we develop a methodology to detect such “domain fluxes” in DNS traffic by looking for patterns inherent to ...
Yadav, Sandeep +3 more
openaire +2 more sources
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains [PDF]
A crucial technical challenge for cybercriminals is to keep control over the potentially millions of infected devices that build up their botnets, without compromising the robustness of their attacks. A single, fixed C&C server, for example, can be trivially detected either by binary or traffic analysis and immediately sink-holed or taken-down by ...
Casino, Fran +4 more
openaire +2 more sources
The Slime Mould Algorithm (SMA) has gained significant attention from researchers due to its powerful multi-point search capability and its simple and practical structure. Several advanced versions of SMA have been proposed.
Xuebing Cai, Zengyu He, Fei Cheng
doaj +1 more source
OCT for glaucoma diagnosis, screening and detection of glaucoma progression. [PDF]
Optical coherence tomography (OCT) is a commonly used imaging modality in the evaluation of glaucomatous damage. The commercially available spectral domain (SD)-OCT offers benefits in glaucoma assessment over the earlier generation of time domain-OCT due
Bussel, Igor I +2 more
core +1 more source
State of Art in Genetic Algorithms for Agricultural Systems
Genetic algorithms are built as abstract populations of a number of candidate solutions, each of it being evaluated for accomplish a desired performance. Populations evolve from one generation to another through mutation, crossover and selection in order
Sorana D. BOLBOACĂ +4 more
doaj +1 more source

