-
801
Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT
Published 2025-01-01“…The escalating surge of cyberattacks targeting IoT systems has exposed critical security vulnerabilities in RPL-based networks. Attackers exploit routing spoofing, resource depletion tactics, and topology manipulation strategies, while inherent constraints of resource-limited devices and scalability challenges in mass deployments amplify these risks. …”
Get full text
Article -
802
An effective PO-RSNN and FZCIS based diabetes prediction and stroke analysis in the metaverse environment
Published 2025-04-01Get full text
Article -
803
Crop yield prediction using machine learning: An extensive and systematic literature review
Published 2025-03-01Get full text
Article -
804
Exploration of machine learning approaches for automated crop disease detection
Published 2024-12-01Get full text
Article -
805
-
806
-
807
An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm
Published 2025-05-01“…Furthermore, the MobileNetV3 model is utilized for the feature extraction process. The temporal convolutional network (TCN) model is implemented for classification. …”
Get full text
Article -
808
Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles.
Published 2025-01-01“…When compared to similar schemes, this approach exhibits reduced computational overhead while providing superior security features.…”
Get full text
Article -
809
-
810
Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints
Published 2024-01-01“…Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. …”
Get full text
Article -
811
LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification
Published 2025-08-01“…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
Get full text
Article -
812
De Novo Reconstruction of 3D Human Facial Images from DNA Sequence
Published 2025-08-01Get full text
Article -
813
-
814
Robust Face Recognition Using Deep Learning and Ensemble Classification
Published 2025-01-01“…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
Get full text
Article -
815
Enhancing anomaly detection in plant disease recognition with knowledge ensemble
Published 2025-08-01Get full text
Article -
816
-
817
MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism
Published 2025-06-01“…To address the high computational complexity and inadequate feature representation in traditional convolutional networks, this study proposes MA-YOLO, an agricultural pest detection model based on multi-scale fusion and attention mechanisms. …”
Get full text
Article -
818
A survey of data-driven fault-diagnosis methods for large-scale industrial production processes
Published 2025-04-01“…The usual fault-diagnosis methods for large-scale systems rely on centralized sensor network monitoring. Centralization necessitates consolidated data processing, which can create immense computational stress. …”
Get full text
Article -
819
Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection
Published 2025-01-01“…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
Get full text
Article -
820