[HTML][HTML] Metamorphic testing of chess engines
Context: Chess engines are computer programs that analyse chess positions. The goal of
this analysis is to decide which player has an advantage and evaluate how big the …
this analysis is to decide which player has an advantage and evaluate how big the …
Early fault classification in rotating machinery with limited data using TabPFN
Intelligent fault detection and classification is a cornerstone of prognostic and health
management of rotating machinery (RM) research. Correctly classifying and predicting RM …
management of rotating machinery (RM) research. Correctly classifying and predicting RM …
Automatic Generation of CEP Rules using Data Analysis Techniques and Model-Driven Engineering
The widespread use of Internet of Things (IoT) systems results in a large volume of data that
needs to be analyzed in real time for efficient usage. Complex Event Processing (CEP) is a …
needs to be analyzed in real time for efficient usage. Complex Event Processing (CEP) is a …
[PDF][PDF] The role of big data in detecting and preventing financial fraud in digital transactions
In the era of digital transactions, the proliferation of financial fraud poses significant
challenges to the security and integrity of financial systems worldwide. Amidst this …
challenges to the security and integrity of financial systems worldwide. Amidst this …
Privacy Armor for IoT: A Fusion Framework of Blockchain and LSTM for Data Security
J Hu, G Du, Q Wang, X Jin - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoT) has led to an exponential increase in
the number of connected devices and sensors, resulting in the generation of a massive …
the number of connected devices and sensors, resulting in the generation of a massive …
Poster: Towards Federated LLM-Powered CEP Rule Generation and Refinement
ML Delouee, DG Pernes, V Degeler… - DEBS'24: ACM …, 2024 - research.rug.nl
In traditional event processing systems, patterns representing situations of interest are
typically defined by domain experts or learned from historical data. These approaches often …
typically defined by domain experts or learned from historical data. These approaches often …
Enhancing Internet of Things Security Through Optimization Algorithms and Machine Learning
ZM Khan - Communications on Applied Nonlinear Analysis, 2024 - internationalpubls.com
IoT network traffic classification is an approach used to analyze IoT network traffic, revealing
various network activities. The network traffic analysis process involves several steps: data …
various network activities. The network traffic analysis process involves several steps: data …
Multi-Temporal-Scale Event Detection and Clustering in Iot Systems
Y Park, IY Ko - Available at SSRN 4846667 - papers.ssrn.com
Abstract Sensor-based Internet of Things (IoT) systems detect events from the data stream
and take appropriate actions through event processing. The core of event processing, event …
and take appropriate actions through event processing. The core of event processing, event …