Results 21 to 30 of about 616,005 (189)

From a Domain Analysis to the Specification and Detection of Code and Design Smells [PDF]

open access: yes, 2009
Code and design smells are recurring design problems in software systems that must be identified to avoid their possible negative consequences\ud on development and maintenance.
Duchien, Laurence   +4 more
core   +4 more sources

Data-Aided Versus Blind Single-Carrier Coherent Receivers

open access: yesIEEE Photonics Journal, 2010
Fiber-optic research in signal processing for the first generation of coherent communication systems was dominated by receivers with blind adaptation. Next-generation systems will require a scalable and modular design for higher order modulation formats.
Maxim Kuschnerov   +8 more
doaj   +1 more source

Implementation and Evaluation of Novel Buildstyles in Fused Deposition Modeling (FDM) [PDF]

open access: yes, 1999
Previous investigations have shown that the optimization of extrusion dynamics in .conjunction with the buildstyle pattern is of paramount importance to increase part quality in Fused Deposition Modeling (FDM).
Jayal, Anshu Dhar   +2 more
core   +1 more source

Inline Detection of DGA Domains Using Side Information

open access: yesIEEE Access, 2020
Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a
Raaghavi Sivaguru   +4 more
doaj   +1 more source

Applications of Artificial Intelligence Algorithms in the Energy Sector

open access: yesEnergies, 2022
The digital transformation of the energy sector toward the Smart Grid paradigm, intelligent energy management, and distributed energy integration poses new requirements for computer science.
Hubert Szczepaniuk   +1 more
doaj   +1 more source

Detecting algorithmically generated malicious domain names

open access: yesProceedings of the 10th ACM SIGCOMM conference on Internet measurement, 2010
Recent Botnets such as Conficker, Kraken and Torpig have used DNS based “domain fluxing” for command-and-control, where each Bot queries for existence of a series of domain names and the owner has to register only one such domain name. In this paper, we develop a methodology to detect such “domain fluxes” in DNS traffic by looking for patterns inherent to ...
Yadav, Sandeep   +3 more
openaire   +2 more sources

Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains [PDF]

open access: yesJournal of Network and Computer Applications, 2021
A crucial technical challenge for cybercriminals is to keep control over the potentially millions of infected devices that build up their botnets, without compromising the robustness of their attacks. A single, fixed C&C server, for example, can be trivially detected either by binary or traffic analysis and immediately sink-holed or taken-down by ...
Casino, Fran   +4 more
openaire   +2 more sources

Improved Slime Mould Algorithm Using Logical Chaos Perturbation and Reference Point Non-Dominated Sorting for Multi-Objective Optimization

open access: yesIEEE Access, 2023
The Slime Mould Algorithm (SMA) has gained significant attention from researchers due to its powerful multi-point search capability and its simple and practical structure. Several advanced versions of SMA have been proposed.
Xuebing Cai, Zengyu He, Fei Cheng
doaj   +1 more source

OCT for glaucoma diagnosis, screening and detection of glaucoma progression. [PDF]

open access: yes, 2013
Optical coherence tomography (OCT) is a commonly used imaging modality in the evaluation of glaucomatous damage. The commercially available spectral domain (SD)-OCT offers benefits in glaucoma assessment over the earlier generation of time domain-OCT due
Bussel, Igor I   +2 more
core   +1 more source

State of Art in Genetic Algorithms for Agricultural Systems

open access: yesNotulae Botanicae Horti Agrobotanici Cluj-Napoca, 2010
Genetic algorithms are built as abstract populations of a number of candidate solutions, each of it being evaluated for accomplish a desired performance. Populations evolve from one generation to another through mutation, crossover and selection in order
Sorana D. BOLBOACĂ   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy