Showing 601 - 620 results of 836 for search 'Computer network Security features.', query time: 0.09s Refine Results
  1. 601
  2. 602
  3. 603
  4. 604
  5. 605
  6. 606
  7. 607
  8. 608
  9. 609
  10. 610

    Online Face Detection and Recognition in a Video Stream by Maha Hasso Al-Ghurery, Manar Zidan Al-Abaji

    Published 2013-12-01
    “…In this work a system is designed for Online Face Detection and Recognition depending on multiple algorithms that are: AdaBoost algorithm for the face detection and the two algorithms Principle Component Analysis (PCA) and Linear Discriminate Analysis (LDA) to extract features and use back propagation neural network in recognition. …”
    Get full text
    Article
  11. 611
  12. 612

    Ensemble-RNN: A Robust Framework for DDoS Detection in Cloud Environment by Asha Varma Songa, Ganesh Redy Karri

    Published 2023-12-01
    “…These selected features are then used to classify the network traffic as either normal or attack, employing RNN. …”
    Get full text
    Article
  13. 613
  14. 614

    DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model by Panpan Jiang, Xiaohua Yang, Yaping Wan, Tiejun Zeng, Mingxing Nie, Zhenghai Liu

    Published 2024-11-01
    “…The model integrates several innovations, including the application of a Re-parameterization Cross-Stage Efficient Layered Attention Network (RCELAN) and a Bidirectional Feature Pyramid Network (BiFPN), to enhance feature processing capabilities while maintaining a lightweight design. …”
    Get full text
    Article
  15. 615
  16. 616
  17. 617
  18. 618

    Enhancing plant disease detection through deep learning: a Depthwise CNN with squeeze and excitation integration and residual skip connections by Asadulla Y. Ashurov, Mehdhar S. A. M. Al-Gaashani, Nagwan A. Samee, Reem Alkanhel, Ghada Atteia, Hanaa A. Abdallah, Mohammed Saleh Ali Muthanna

    Published 2025-01-01
    “…The architectural modifications are specifically designed to enhance feature extraction and classification performance, all while maintaining computational efficiency. …”
    Get full text
    Article
  19. 619
  20. 620

    Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment by Sneha Leela Jacob, H. Parveen Sultana

    Published 2025-01-01
    “…The Internet of Things (IoT) system has been developed to create a smart environment. Privacy and security are critical issues in IoT systems. Security vulnerabilities in IoT-enabled models generate threats that impact various applications. …”
    Get full text
    Article