Advanced Mathematics and Numerical Modeling of IoT
Table 7: Method of finding assignment information in the database of the connection or authentication management system. Solutio ...
Table 9: Acquisition of virtual machine data using a hypervisor CLI with default utilities for each solution. Solution Shell con ...
Table 12: Results for experiment #2 on integrity verification for logical drives for Citrix. Area Original HDD Acquisition data ...
Table 13: Comparison of hash values for various tools. Index Original virtual hard disk Copy of virtual hard disk Result EnCase ...
Research Article Fall-Detection Algorithm Using 3-Axis Acceleration: Combination with Simple Threshold and Hidden Markov Model D ...
(a) (b) Figure 1: Photograph of the sensor node (80 mm×50 mm) for fall detection. (a) Front side and (b) back side. sensitivity ...
calibrated in order to correct any possible axis tilt due to the orientation of the device on the subject or lower back tilt of ...
Walking Running Standing jumping Lying down and standing up from a bed Falling forward over something Falling laterally by losi ...
(1) Calculate all the values in model matricesmatrices휆푖=(퐴푖,퐵푖,휋푖)∗of all single parameters for푖activities of four types of ADL ...
0 20406080100 False positive rate 0 20 40 60 80 100 True positive rate 0 g 1 g 1.5g 2 g 3 g ADSVM Figure 6: ROC curve of fall de ...
Vision Inspection algorithm and Wireless and Wired Inte- grated Control System for Intelligent Logistics Inspection]. References ...
[33] W. O. Odoyo, J.-H. Choi, I.-K. Moon, and B.-J. Cho, “Silhouette- edge-based descriptor for human action representation and ...
Research Article Linear SVM-Based Android Malware Detection for Reliable IoT Services Hyo-Sik Ham,^1 Hwan-Hee Kim,^1 Myung-Sup K ...
100 100 All threats Android Blackberry J2ME Windows mobile Symbian iOS 96 46 49 47 21 18 2 2 14 4 74 66 61 90 80 70 60 50 40 30 ...
Table 1: Trends of studies on mobile malware detection techniques. Detection technique Author Collected data Description Signatu ...
Table 2: Selected features for malware detection. Resource type Resource feature Network RxBytes, TxBytes, RxPacket, TxPacket Te ...
Android malware detection system Mobile agent Data management module Resource monitoring component Alarm module module Communica ...
Database Machine learning classifier (learning and testing phase) Data management module Feature Collect features (network, batt ...
Data set Test set Device 1 Device 2 Device 4 Device 3 Device 5 Training set Data set Test set Device 5 Device 1 Device 3 Device ...
Table 5: Detailed performance indicators of machine learning classifiers (TPR/FPR). Normal and malware TPR FPR BN DT NB RF SVM B ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf