|
|
|
Manar M. F. Donia, Wessam H. El-Behaidy and Aliaa A. A. Youssif
The study of human behaviors aims to gain a deeper perception of stimuli that control decision making. To describe, explain, predict, and control behavior, human behavior can be classified as either non-aggressive or anomalous behavior. Anomalous behavio...
ver más
|
|
|
|
|
|
|
Longguang Chen, Bin Chen, Ruiyu Zhao and Xiangde Xu
Extreme precipitation events frequently occur at the southeastern edge of the Tibetan Plateau (SETP), causing severe disasters. In this study, we selected the top 100 regional extreme precipitation events over the SETP region during the period of 2001?20...
ver más
|
|
|
|
|
|
|
Peng Zhang and Zhiwei Wu
Understanding the influence of the El Niño?Southern Oscillation (ENSO) on the North Atlantic Oscillation (NAO) is of critical significance for seasonal prediction. The present study found that both Niño3.4 sea surface temperature anomaly (SSTA) intensity...
ver más
|
|
|
|
|
|
|
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,...
ver más
|
|
|
|
|
|
|
Amin Minaei, Sara Todeschini, Robert Sitzenfrei and Enrico Creaco
Climate change increasingly is affecting every aspect of human life on the earth. Many regional climate models (RCMs) have so far been developed to carefully assess this important phenomenon on specific regions. In this study, ten RCMs captured from the ...
ver más
|
|
|
|
|
|
|
Konrad Wolsing, Linus Roepert, Jan Bauer and Klaus Wehrle
The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, s...
ver más
|
|
|
|
|
|
|
Diogo Teixeira, Silvestre Malta and Pedro Pinto
An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and data. Anomaly-based IDSs may deploy machine learning algorithms to classify events either as normal or anomalous and trigger the adequate response. When ...
ver más
|
|
|
|
|
|
|
Yusuf Jati Wijaya, Ulung Jantama Wisha and Yukiharu Hisaki
This research aims to examine how the Western Pacific North equatorial countercurrent (NECC) flow reacts to two different forms of El Niño (EN) over a 40-year period. To establish the prevailing modes for each season, we implemented Empirical Orthogonal ...
ver más
|
|
|
|
|
|
|
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m...
ver más
|
|
|
|
|
|
|
Kun Qin, Qixin Wang, Binbin Lu, Huabo Sun and Ping Shu
In the civil aviation industry, security risk management has shifted from post-accident investigations and analyses to pre-accident warnings in an attempt to reduce flight risks by identifying currently untracked flight events and their trends and effect...
ver más
|
|
|
|