Showing 421 - 440 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.16s Refine Results
  1. 421
  2. 422

    AUTOMATED ANALYSIS OF BREAKERS by E. M. Farhadzade, A. Z. Muradaliev, T. K. Rafieva, S. A. Abdullaeva

    Published 2014-12-01
    “…The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual  reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving  and advanced methods for its realization.…”
    Get full text
    Article
  3. 423
  4. 424
  5. 425
  6. 426

    An optimized stacking-based TinyML model for attack detection in IoT networks. by Anshika Sharma, Shalli Rani, Mohammad Shabaz

    Published 2025-01-01
    “…To address these challenges, a stacking-based Tiny Machine Learning (TinyML) models has been proposed for attack detection in IoT networks. This ensures detection efficiently and without additional computational overhead. …”
    Get full text
    Article
  7. 427
  8. 428

    A Human Tracking System for the Rocker-Bogie Mobile Robot Utilizing the YOLOv8 Network by Huy Anh Bui, Thi Thoa Mac, Xuan Thuan Nguyen

    Published 2025-05-01
    “…In this paper, a prototype of a Rocker-Bogie mobile robot featuring a human tracking system is proposed. To be more detailed, the modified YOLOv8 network is designed to detect humans and corresponds to the operation of the robot in real time. …”
    Get full text
    Article
  9. 429
  10. 430
  11. 431
  12. 432
  13. 433

    A comparative study of deepfake facial manipulation technique using generative adversarial networks by Wasin Al Kishri, Jabar H. Yousif, Mahmood Al Bahri, Muhammad Zakarya, Naveed Khan, Sanad Sulaiman Al Maskari, Ahmet Gurhanli

    Published 2025-06-01
    “…Due to the development of image processing tools and visualization techniques integrating deep learning and artificial intelligence (AI) algorithms (in particular generative adversarial networks–GAN), this can pose serious threats to privacy and security. …”
    Get full text
    Article
  14. 434
  15. 435

    Priority-Aware SDN Orchestration for Surgical IoMT: A Joint Optimization of Hit Ratio and Latency With Dynamic Resource Reallocation by Yalda Safaei, Pouria Arefijamal, Mahdi Siamaki, Bardia Safaei

    Published 2025-01-01
    “…A key distinguishing feature is its dynamic resource reallocation mechanism, which employs the preemption of lower-priority, non-medical traffic to proactively secure network resources and guarantee QoS for vital surgical flows, even during periods of high network load. …”
    Get full text
    Article
  16. 436
  17. 437
  18. 438
  19. 439

    Spatial-Temporal Cooperative In-Vehicle Network Intrusion Detection Method Based on Federated Learning by Liu Tao, Zhao Xiyang

    Published 2025-01-01
    “…With the widespread adoption of intelligent connected vehicles (ICV) and the rapid development of the internet of vehicles (IoV), the security of in-vehicle network (IVN) has become increasingly critical. …”
    Get full text
    Article
  20. 440