-
461
FRR: A Fast Routing Recovery mechanism minimizing network formation time in smart grids
Published 2025-03-01Get full text
Article -
462
Ensemble-based sesame disease detection and classification using deep convolutional neural networks (CNN)
Published 2025-08-01Get full text
Article -
463
SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition
Published 2025-05-01“…Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples. …”
Get full text
Article -
464
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
465
MDPNet: a dual-path parallel fusion network for multi-modal MRI glioma genotyping
Published 2025-05-01Get full text
Article -
466
-
467
An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images
Published 2025-07-01“…Deep learning (DL) methods are essential for processing security problems in UAV networks. This paper presents a Privacy-Preserving Intrusion Detection Model for UAV-Based Remote Sensing Applications in Land Cover Classification Using Multilevel Fusion Feature Engineering (IDUAVRS-LCCMFFE) technique. …”
Get full text
Article -
468
-
469
-
470
-
471
5G-Practical Byzantine Fault Tolerance: An Improved PBFT Consensus Algorithm for the 5G Network
Published 2025-03-01Get full text
Article -
472
-
473
-
474
-
475
THE IMPACT OF ECONOMIC COMPANY DATA THEFT
Published 2018-05-01“…In terms of preventing internal threats, solutions have powerful encryption algorithms that protect important business information, application control tools, device control, web control and mobile device management features to implement IT security policies. The solutions created by specialists provide effective protection against all types of threats on the Internet and help maintain productivity at work with simple web policies that can limit employees‟ access to social networks, online gaming, or other sites during working hours. …”
Get full text
Article -
476
MVCG-SPS: A Multi-View Contrastive Graph Neural Network for Smart Ponzi Scheme Detection
Published 2025-03-01Get full text
Article -
477
-
478
Elliptic curve cryptography and biometrics for iot authentication
Published 2025-01-01“…Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features.…”
Get full text
Article -
479
Neurophysiological Approaches to Lie Detection: A Systematic Review
Published 2025-05-01Get full text
Article -
480
Improved Crime Prediction Using Hybrid Neural Architecture Search Together with Hyperparameter Tuning
Published 2025-07-01Get full text
Article