A review on fault detection and diagnosis techniques: basics and beyond
Safety and reliability are absolutely important for modern sophisticated systems and
technologies. Therefore, malfunction monitoring capabilities are instilled in the system for …
technologies. Therefore, malfunction monitoring capabilities are instilled in the system for …
[HTML][HTML] Comparative analysis of blockchain technology to support digital transformation in ports and ship**
Blockchain is one of the technologies that can support digital transformation in industries in
many aspects. This sophisticated technology can provide a decentralized, transparent, and …
many aspects. This sophisticated technology can provide a decentralized, transparent, and …
Examining multiple feature evaluation and classification methods for improving the diagnosis of Parkinson's disease
An accurate diagnosis of Parkinson's disease by specialists involves many neurological,
psychological and physical examinations. The specialists investigate a number of symptoms …
psychological and physical examinations. The specialists investigate a number of symptoms …
[PDF][PDF] Black hole and sink hole attack detection in wireless body area networks
In Wireless Body Area Networks (WBANs) with respect to health care, sensors are
positioned inside the body of an individual to transfer sensed data to a central station …
positioned inside the body of an individual to transfer sensed data to a central station …
Smart home battery for the multi-objective power scheduling problem in a smart home using grey wolf optimizer
The power scheduling problem in a smart home (PSPSH) refers to the timely scheduling
operations of smart home appliances under a set of restrictions and a dynamic pricing …
operations of smart home appliances under a set of restrictions and a dynamic pricing …
An adaptive protection of flooding attacks model for complex network environments
Currently, online organizational resources and assets are potential targets of several types
of attack, the most common being flooding attacks. We consider the Distributed Denial of …
of attack, the most common being flooding attacks. We consider the Distributed Denial of …
[PDF][PDF] Performance comparison between TCP and UDP protocols in different simulation scenarios
Abstract User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are a
transportation layer routing protocols which are considered of the core protocols of the …
transportation layer routing protocols which are considered of the core protocols of the …
[HTML][HTML] A reversible watermarking system for medical color images: balancing capacity, imperceptibility, and robustness
The authenticity and integrity of medical images in telemedicine has to be protected. Robust
reversible watermarking (RRW) algorithms provide copyright protection and the original …
reversible watermarking (RRW) algorithms provide copyright protection and the original …
W-GeoR: Weighted geographical routing for VANET's health monitoring applications in urban traffic networks
Natural disasters like earthquakes and tsunami could destroy the existing infrastructure-
based communication system. IoT-based health monitoring is not possible in such …
based communication system. IoT-based health monitoring is not possible in such …
Genetic case-based reasoning for improved mobile phone faults diagnosis
Different types of fault diagnostic applications that utilize case-based reasoning (CBR) are
applied in the diagnosis process. However, CBR cannot provide solutions to unanticipated …
applied in the diagnosis process. However, CBR cannot provide solutions to unanticipated …