-
541
-
542
Graph Neural Network Classification in EEG-Based Biometric Identification: Evaluation of Functional Connectivity Methods Using Time-Frequency Metric
Published 2025-01-01“…Despite reduced setup complexity, our GCNN achieves over 98% identification accuracy, comparable to CNN-based studies using 64 channels, with significantly lower computational cost and trainable variables reduced to less than 0.25 of those in a Convolutional Neural Network (CNN). …”
Get full text
Article -
543
Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-...
Published 2024-09-01“…The fast growth of the Internet has made network security problems more noticeable, so intrusion detection systems (IDSs) have become a crucial tool for maintaining network security. …”
Get full text
Article -
544
Research Progress of Dangerous Driving Behavior Recognition Methods Based on Deep Learning
Published 2025-01-01Get full text
Article -
545
-
546
Jordanian banknote data recognition: A CNN-based approach with attention mechanism
Published 2024-04-01Get full text
Article -
547
-
548
A depth-wise separable VGG19-capsule network for enhanced bell pepper and grape leaf disease classification with ensemble activation
Published 2025-01-01“…This ensures that the capsule network effectively captures spatial information and preserves the hierarchical relationships between features. …”
Get full text
Article -
549
On the Modeling of Sequential Reactive Systems by Means of Real Time Automata
Published 2020-12-01Get full text
Article -
550
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms
Published 2025-07-01“…Numerous interaction activities occur among IoV entities to share significant information, which is essential for network operation. As part of intellectual transportation, IoV is a hot topic for researchers because it faces numerous unresolved challenges, particularly regarding privacy and security. …”
Get full text
Article -
551
Optimized disease prediction in healthcare systems using HDBN and CAEN framework
Published 2025-06-01Get full text
Article -
552
-
553
A Hybrid Approach for Color Face Recognition Based on Image Quality Using Multiple Color Spaces
Published 2024-12-01Get full text
Article -
554
A Lightweight Intrusion Detection System for Internet of Things: Clustering and Monte Carlo Cross-Entropy Approach
Published 2025-04-01“…To address these challenges, machine learning-based intrusion detection systems (IDSs)—traditionally considered a primary line of defense—have been deployed to monitor and detect malicious activities in IoT networks. Despite this, these IDS solutions often struggle with the inherent resource constraints of IoT devices, including limited computational power and memory. …”
Get full text
Article -
555
Mitigating cloud vulnerabilities using a blockchain platform
Published 2025-04-01“…Hence, the advanced neural networks, coupled with cloud and edge computing, can significantly optimize CBIR systems, making them more robust, scalable, and applicable to a wide range of industries such as healthcare, security, and e-commerce.…”
Get full text
Article -
556
-
557
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01“…The Internet of Things (IoT) is a network that interconnects many everyday objects, including computers, televisions, washing machines, and even whole urban areas. …”
Get full text
Article -
558
Improved YOLOv8 Object Detection Method for Drone Aerial Images
Published 2025-06-01Get full text
Article -
559
CPS-IIoT-P2Attention: Explainable Privacy-Preserving With Scaled Dot-Product Attention in Cyber-Physical System-Industrial IoT Network
Published 2025-01-01“…These mechanisms adaptively modify their emphasis to prioritize crucial features within the CPS-IIoT network traffic data, providing additional computational resources to data segments that are likely to include abnormalities and patterns that indicate security issues. …”
Get full text
Article -
560
Advancing the accuracy of clathrin protein prediction through multi-source protein language models
Published 2025-07-01“…Finally, we employed a long short-term memory (LSTM) neural network model coupled with the optimal feature subset to identify clathrins. …”
Get full text
Article