Search Results - yasin+yilmaz

3 Results Sort By:
DRL Based Adaptive Network Slicing for 5G Applications
­Competitive Advantages The network learns dynamically through interaction with the environment and adapts to it. Edge controllers can efficiently manage the edge resources by enabling cooperation among the fog nodes. Slices the network optimally as per the task load and latency needs. Summary Researchers at the University of South Florida...
Published: 7/12/2023   |   Inventor(s): Almuthanna Nassar, Yasin Yilmaz
Keywords(s): Computer Science, Telecommunication / Wireless Communication
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Computer Science, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Network Systems, Technology Classifications > Engineering > Transportation, Technology Classifications > Engineering > Autonomous Vehicle
System And Method for Online Anomaly Detection In Surveillance Video
Competitive Advantages Faster processing times Higher accuracy than current technologies Simple implementation into current technology Summary We have developed an algorithm to detect anomalies in online surveillance video quickly and accurately. This technology incorporates two modules, the first of which is a novel feature extraction...
Published: 7/11/2023   |   Inventor(s): Keval Doshi, Mahsa Mozaffari, Yasin Yilmaz
Keywords(s): Computers Software and Information Technology, Forensic Applications, Hardware Based Security, Image Tracking
Category(s): Technology Classifications > Software > Multimedia, Technology Classifications > Software
Data Anomaly Detection and Localization with Reduced Delay and False Alarm Rate
Competitive Advantages Monitors and analyzes large data sets Accurate detection of irregularities Minimized average detection delay Summary We have developed a technique called Online Discrepancy Test (ODIT) for real-time detection of anomalies in high-dimensional systems. This algorithm is generic and applicable to various contexts...
Published: 7/11/2023   |   Inventor(s): Mahsa Mozaffari, Keval Doshi, Yasin Yilmaz
Keywords(s): Cybersecurity, Data Mining, Database Management, Datasets, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Datasets