Search alternatives:
networks » network (Expand Search)
Showing 421 - 440 results of 836 for search 'Computer networks Security features.', query time: 0.17s Refine Results
  1. 421

    Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network by Yuecheng WANG, Youwen ZHU, Zhiqiang ZHANG

    Published 2025-01-01
    “…If directly applied to multi-party interaction scenarios, traditional two-party key negotiation protocols require numerous interaction rounds, resulting in significant computational and communication overhead. Therefore, group key agreement protocols for UAV networks must provide a lighter computing process and stronger security guarantees.Methods This protocol adopts a certificateless key system. …”
    Get full text
    Article
  2. 422
  3. 423

    SoybeanNet: A Lightweight Neural Network for Soybean Pod Detection and Quantification by Nayak Ashu, Raghatate Kapesh Subhash

    Published 2025-01-01
    “…Future work will focus on extending SoybeanNet to detect and quantify other critical crop features and integrating it with broader agricultural monitoring systems to support sustainable farming and food security.…”
    Get full text
    Article
  4. 424
  5. 425
  6. 426
  7. 427
  8. 428

    AUTOMATED ANALYSIS OF BREAKERS by E. M. Farhadzade, A. Z. Muradaliev, T. K. Rafieva, S. A. Abdullaeva

    Published 2014-12-01
    “…The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual  reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving  and advanced methods for its realization.…”
    Get full text
    Article
  9. 429

    An optimized stacking-based TinyML model for attack detection in IoT networks. by Anshika Sharma, Shalli Rani, Mohammad Shabaz

    Published 2025-01-01
    “…To address these challenges, a stacking-based Tiny Machine Learning (TinyML) models has been proposed for attack detection in IoT networks. This ensures detection efficiently and without additional computational overhead. …”
    Get full text
    Article
  10. 430
  11. 431

    A Human Tracking System for the Rocker-Bogie Mobile Robot Utilizing the YOLOv8 Network by Huy Anh Bui, Thi Thoa Mac, Xuan Thuan Nguyen

    Published 2025-05-01
    “…In this paper, a prototype of a Rocker-Bogie mobile robot featuring a human tracking system is proposed. To be more detailed, the modified YOLOv8 network is designed to detect humans and corresponds to the operation of the robot in real time. …”
    Get full text
    Article
  12. 432
  13. 433
  14. 434
  15. 435
  16. 436
  17. 437

    A comparative study of deepfake facial manipulation technique using generative adversarial networks by Wasin Al Kishri, Jabar H. Yousif, Mahmood Al Bahri, Muhammad Zakarya, Naveed Khan, Sanad Sulaiman Al Maskari, Ahmet Gurhanli

    Published 2025-06-01
    “…Due to the development of image processing tools and visualization techniques integrating deep learning and artificial intelligence (AI) algorithms (in particular generative adversarial networks–GAN), this can pose serious threats to privacy and security. …”
    Get full text
    Article
  18. 438
  19. 439

    Priority-Aware SDN Orchestration for Surgical IoMT: A Joint Optimization of Hit Ratio and Latency With Dynamic Resource Reallocation by Yalda Safaei, Pouria Arefijamal, Mahdi Siamaki, Bardia Safaei

    Published 2025-01-01
    “…A key distinguishing feature is its dynamic resource reallocation mechanism, which employs the preemption of lower-priority, non-medical traffic to proactively secure network resources and guarantee QoS for vital surgical flows, even during periods of high network load. …”
    Get full text
    Article
  20. 440