Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
2019 1
2020 1
2024 0

Text availability

Article attribute

Article type

Publication date

Search Results

2 results

Results by year

Filters applied: . Clear all
Page 1
Interference-Aware Routing for Difficult Wireless Sensor Network Environment with SWIPT.
He S, Tang Y, Li Z, Li F, Xie K, Kim HJ, Kim GJ. He S, et al. Sensors (Basel). 2019 Sep 14;19(18):3978. doi: 10.3390/s19183978. Sensors (Basel). 2019. PMID: 31540111 Free PMC article.
The main challenges of sensing in harsh industrial and biological environments are the limited energy of sensor nodes and the difficulty of charging sensor nodes. Simultaneous wireless information and power transfer (SWIPT) is a non-invasive option to repleni …
The main challenges of sensing in harsh industrial and biological environments are the limited energy of sensor nodes and the difficu …
LogEvent2vec: LogEvent-to-Vector Based Anomaly Detection for Large-Scale Logs in Internet of Things.
Wang J, Tang Y, He S, Zhao C, Sharma PK, Alfarraj O, Tolba A. Wang J, et al. Sensors (Basel). 2020 Apr 26;20(9):2451. doi: 10.3390/s20092451. Sensors (Basel). 2020. PMID: 32357404 Free PMC article.
After getting the log event vector, we transform log event vector to log sequence vector by bary or tf-idf and three kinds of supervised models (Random Forests, Naive Bayes, and Neural Networks) are trained to detect the anomalies. We have conducted extensive experiments o …
After getting the log event vector, we transform log event vector to log sequence vector by bary or tf-idf and three kinds of supervised mod …