-
421
ATBShellFinder: A Bytecode-Level Webshell Detector Based on Adversarial Training
Published 2025-01-01Get full text
Article -
422
AUTOMATED ANALYSIS OF BREAKERS
Published 2014-12-01“…The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving and advanced methods for its realization.…”
Get full text
Article -
423
Enhancing Disease Detection in the Aquaculture Sector Using Convolutional Neural Networks Analysis
Published 2025-03-01Get full text
Article -
424
Enhancing Performance of Credit Card Model by Utilizing LSTM Networks and XGBoost Algorithms
Published 2025-02-01Get full text
Article -
425
A survival prediction network based on multi-scale hypergraph enhancement and cross-modal refinement
Published 2025-08-01Get full text
Article -
426
An optimized stacking-based TinyML model for attack detection in IoT networks.
Published 2025-01-01“…To address these challenges, a stacking-based Tiny Machine Learning (TinyML) models has been proposed for attack detection in IoT networks. This ensures detection efficiently and without additional computational overhead. …”
Get full text
Article -
427
A SOVEREIGN STATE IN THE XXI CENTURY: NEW CHALLENGES AND THREATS
Published 2023-01-01Get full text
Article -
428
A Human Tracking System for the Rocker-Bogie Mobile Robot Utilizing the YOLOv8 Network
Published 2025-05-01“…In this paper, a prototype of a Rocker-Bogie mobile robot featuring a human tracking system is proposed. To be more detailed, the modified YOLOv8 network is designed to detect humans and corresponds to the operation of the robot in real time. …”
Get full text
Article -
429
-
430
Multimodal scene recognition using semantic segmentation and deep learning integration
Published 2025-05-01Get full text
Article -
431
Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks
Published 2022-01-01Get full text
Article -
432
ASD-YOLO: a lightweight network for coffee fruit ripening detection in complex scenarios
Published 2025-02-01Get full text
Article -
433
A comparative study of deepfake facial manipulation technique using generative adversarial networks
Published 2025-06-01“…Due to the development of image processing tools and visualization techniques integrating deep learning and artificial intelligence (AI) algorithms (in particular generative adversarial networks–GAN), this can pose serious threats to privacy and security. …”
Get full text
Article -
434
-
435
Priority-Aware SDN Orchestration for Surgical IoMT: A Joint Optimization of Hit Ratio and Latency With Dynamic Resource Reallocation
Published 2025-01-01“…A key distinguishing feature is its dynamic resource reallocation mechanism, which employs the preemption of lower-priority, non-medical traffic to proactively secure network resources and guarantee QoS for vital surgical flows, even during periods of high network load. …”
Get full text
Article -
436
-
437
Dual Attention Dual-Resolution Networks for Real-Time Semantic Segmentation of Street Scenes
Published 2025-01-01Get full text
Article -
438
Dynamic Bayesian network modeling for longitudinal data on child undernutrition in Ethiopia (2002–2016)
Published 2024-12-01Get full text
Article -
439
Spatial-Temporal Cooperative In-Vehicle Network Intrusion Detection Method Based on Federated Learning
Published 2025-01-01“…With the widespread adoption of intelligent connected vehicles (ICV) and the rapid development of the internet of vehicles (IoV), the security of in-vehicle network (IVN) has become increasingly critical. …”
Get full text
Article -
440
ASAD: A Meta Learning-Based Auto-Selective Approach and Tool for Anomaly Detection
Published 2025-01-01Get full text
Article