Results 51 to 60 of about 266,150 (211)

Towards a Comprehensive Framework for Climate Change Multi-Risk Assessment in the Mining Industry

open access: yesInfrastructures, 2019
Changing climate conditions affect mining operations all over the world, but so far, the mining sector has focused primarily on mitigation actions. Nowadays, there exists increasing recognition of the need for planned adaptation actions. To this end, the
Evangelos Mavrommatis   +2 more
doaj   +1 more source

FACS: Fairness aware clustering scheme for monitoring applications of internet of things based wireless sensor networks

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Energy conservation is one of the main challenges hindering the advancement of Wireless Sensor Networks (WSNs) in the Internet of Things (IoT). Although various approaches including probabilistic, deterministic, and mixed model based solutions have been ...
Walid Osamy, Ahmed M. Khedr
doaj   +1 more source

A State Recognition Approach for Complex Equipment Based on a Fuzzy Probabilistic Neural Network

open access: yesAlgorithms, 2016
Due to the traditional state recognition approaches for complex electromechanical equipment having had the disadvantages of excessive reliance on complete expert knowledge and insufficient training sets, real-time state identification system was always ...
Jing Xu   +3 more
doaj   +1 more source

Studying Transaction Fees in the Bitcoin Blockchain with Probabilistic Logic Programming

open access: yesInf., 2019
In Bitcoin, if a miner is able to solve a computationally hard problem called proof of work, it will receive an amount of bitcoin as a reward which is the sum of the fees for the transactions included in a block plus an amount inversely proportional to ...
Damiano Azzolini   +2 more
semanticscholar   +1 more source

DG System Using PFNN Controllers for Improving Islanding Detection and Power Control

open access: yesEnergies, 2019
In this study, an intelligent controlled distributed generator (DG) system is proposed for tracking control and islanding detection. First, a DC/AC inverter with DC power supply is adopted to emulate a DG system and control the active and reactive power ...
Kuang-Hsiung Tan, Chien-Wu Lan
doaj   +1 more source

Forecasting worldwide empty container availability with machine learning techniques

open access: yesJournal of Shipping and Trade, 2022
Due to imbalances in the global transport of containerised goods, liner shipping companies go to great lengths to match the regional supply and demand for empty containers by transporting equipment from surplus to deficit regions.
Christoph Martius   +4 more
doaj   +1 more source

A Probabilistic Logic of Cyber Deception

open access: yesIEEE Transactions on Information Forensics and Security, 2017
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may exploit as they traverse the network. In this paper, we propose that the system generates a mix of true and false answers in response to scan requests ...
S. Jajodia   +6 more
semanticscholar   +1 more source

Applications of Nonclassical Logic Methods for Purposes of Knowledge Discovery and Data Mining [PDF]

open access: yes, 2004
* The work is partially supported by Grant no. NIP917 of the Ministry of Science and Education – Republic of Bulgaria.Methods for solution of a large class of problems on the base of nonclassical, multiple-valued, and probabilistic logics have been ...
Jotsov, Vladimir   +2 more
core  

Stochastic Spin-Orbit Torque Devices as Elements for Bayesian Inference

open access: yes, 2017
Probabilistic inference from real-time input data is becoming increasingly popular and may be one of the potential pathways at enabling cognitive intelligence.
Chen, Shuhan   +3 more
core   +1 more source

Formal Verification and Improvement of SAP-AKA Secondary Authentication Protocol [PDF]

open access: yesJisuanji gongcheng
The SAP-AKA protocol is a secondary authentication protocol that provides key service security for vertical users, based on the Extensible Authentication Protocol (EAP) framework defined by the 3rd Generation Partnership Project(3GPP)standard.
PENG Chengwei, YANG Jinji, YANG Guang
doaj   +1 more source

Home - About - Disclaimer - Privacy