-
421
Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
Published 2025-01-01“…If directly applied to multi-party interaction scenarios, traditional two-party key negotiation protocols require numerous interaction rounds, resulting in significant computational and communication overhead. Therefore, group key agreement protocols for UAV networks must provide a lighter computing process and stronger security guarantees.Methods This protocol adopts a certificateless key system. …”
Get full text
Article -
422
A Dual-band Planar Antenna for Wireless Local Area Network Applications
Published 2019-12-01Get full text
Article -
423
SoybeanNet: A Lightweight Neural Network for Soybean Pod Detection and Quantification
Published 2025-01-01“…Future work will focus on extending SoybeanNet to detect and quantify other critical crop features and integrating it with broader agricultural monitoring systems to support sustainable farming and food security.…”
Get full text
Article -
424
Enhancing Disease Detection in the Aquaculture Sector Using Convolutional Neural Networks Analysis
Published 2025-03-01Get full text
Article -
425
Enhancing Performance of Credit Card Model by Utilizing LSTM Networks and XGBoost Algorithms
Published 2025-02-01Get full text
Article -
426
ATBShellFinder: A Bytecode-Level Webshell Detector Based on Adversarial Training
Published 2025-01-01Get full text
Article -
427
A survival prediction network based on multi-scale hypergraph enhancement and cross-modal refinement
Published 2025-08-01Get full text
Article -
428
AUTOMATED ANALYSIS OF BREAKERS
Published 2014-12-01“…The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving and advanced methods for its realization.…”
Get full text
Article -
429
An optimized stacking-based TinyML model for attack detection in IoT networks.
Published 2025-01-01“…To address these challenges, a stacking-based Tiny Machine Learning (TinyML) models has been proposed for attack detection in IoT networks. This ensures detection efficiently and without additional computational overhead. …”
Get full text
Article -
430
Multimodal scene recognition using semantic segmentation and deep learning integration
Published 2025-05-01Get full text
Article -
431
A Human Tracking System for the Rocker-Bogie Mobile Robot Utilizing the YOLOv8 Network
Published 2025-05-01“…In this paper, a prototype of a Rocker-Bogie mobile robot featuring a human tracking system is proposed. To be more detailed, the modified YOLOv8 network is designed to detect humans and corresponds to the operation of the robot in real time. …”
Get full text
Article -
432
A SOVEREIGN STATE IN THE XXI CENTURY: NEW CHALLENGES AND THREATS
Published 2023-01-01Get full text
Article -
433
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
Published 2023-01-01Get full text
Article -
434
Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks
Published 2022-01-01Get full text
Article -
435
ASD-YOLO: a lightweight network for coffee fruit ripening detection in complex scenarios
Published 2025-02-01Get full text
Article -
436
-
437
A comparative study of deepfake facial manipulation technique using generative adversarial networks
Published 2025-06-01“…Due to the development of image processing tools and visualization techniques integrating deep learning and artificial intelligence (AI) algorithms (in particular generative adversarial networks–GAN), this can pose serious threats to privacy and security. …”
Get full text
Article -
438
-
439
Priority-Aware SDN Orchestration for Surgical IoMT: A Joint Optimization of Hit Ratio and Latency With Dynamic Resource Reallocation
Published 2025-01-01“…A key distinguishing feature is its dynamic resource reallocation mechanism, which employs the preemption of lower-priority, non-medical traffic to proactively secure network resources and guarantee QoS for vital surgical flows, even during periods of high network load. …”
Get full text
Article -
440