Results 91 to 100 of about 27,602 (172)

Event‐Triggered Saturating Control for Synchronization of Lur'e Type Complex Dynamic Networks

open access: yesInternational Journal of Robust and Nonlinear Control, Volume 36, Issue 4, Page 2184-2198, 10 March 2026.
ABSTRACT This article addresses the problem of synchronizing discrete‐time Lur'e type complex dynamic networks (CDNs) via dynamic event‐triggered control. In particular, it is considered that the control signal of each node is subject to input saturation. Using the Lyapunov Stability Theory, properties of slope‐restricted nonlinearities, and the linear
C. Lisbôa   +3 more
wiley   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

High‐Resolution Neural Network‐Based Teaching Skill Development for Teachers in Edge Computing Environment

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Where user devices include cell phones, tablets, laptops, and so on, which communicate with edge computing servers and use computational as well as storage resources provided by edge computing. Network connectivity is the core component of edge computing, which allows communication between mobile devices and edge computing nodes.
Genlian Zhang
wiley   +1 more source

Digital Twin Integration in Project Life Cycle Management—A Review

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study explores the integration of digital twin (DT) technology within project life cycle management (PLM), focusing on its transformative impact on industries like aerospace, automotive, healthcare, and construction. By creating real‐time virtual models synchronized with physical assets, DTs enable predictive maintenance, operational optimization,
Md. Injamamul Haque Protyai   +2 more
wiley   +1 more source

Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley   +1 more source

Traffic concealed data detection method based on contrastive learning and pre-trained Transformer

open access: yesTongxin xuebao
To solve the problems of characterizing representing massive encrypted traffic, perceiving malicious behaviors, and identifying the ownership of privacy data, a traffic concealed data detection method was proposed based on contrastive learning and pre ...
HE Shuai   +5 more
doaj  

HADA: A Hybrid Anomaly Detection Approach Using Unsupervised Machine Learning

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Overview of HADA, an unsupervised fraud detection pipeline that preprocesses and scales transaction data, applies PCA for dimensionality reduction, scores anomalies using Isolation Forest, selects anomalous transactions via thresholding, and clusters the selected anomalies using Agglomerative Hierarchical Clustering (AHC) to produce interpretable ...
Francis Thiong'o   +3 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

f‐Block Element‐Based MOF Thin Films: A Platform for Luminescence, Sensing, and Energy Applications

open access: yesSmall, Volume 22, Issue 16, 17 March 2026.
f‐Block element–based metal–organic framework (f‐MOF) thin films offer exceptional potential for luminescent, sensing, and energy‐related applications. This review surveys recent progress in their synthesis, characterization, and functional implementation, emphasizing the diversity of available thin‐film fabrication strategies. The convergence of these
Dong‐Hui Chen, Christof Wöll
wiley   +1 more source

Software defined networking based network traffic classification using machine learning techniques

open access: yesScientific Reports
The classification of network traffic has become increasingly crucial due to the rapid growth in the number of internet users. Conventional approaches, such as identifying traffic based on port numbers and payload inspection are becoming ineffective due ...
Ayodeji Olalekan Salau   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy