Search alternatives:
networks » network (Expand Search)
Showing 501 - 520 results of 836 for search 'Computer networks Security features.', query time: 0.17s Refine Results
  1. 501
  2. 502
  3. 503

    LGR-Net: A Lightweight Defect Detection Network Aimed at Elevator Guide Rail Pressure Plates by Ruizhen Gao, Meng Chen, Yue Pan, Jiaxin Zhang, Haipeng Zhang, Ziyue Zhao

    Published 2025-03-01
    “…To improve the localization accuracy for small defects, we add a high-resolution small object detection layer (P2 layer) and integrate the Convolutional Block Attention Module (CBAM) to construct a four-scale feature fusion network. This study employs various data augmentation methods to construct a custom dataset for guide rail pressure plate defect detection. …”
    Get full text
    Article
  4. 504
  5. 505
  6. 506

    A Human-Centric, Uncertainty-Aware Event-Fused AI Network for Robust Face Recognition in Adverse Conditions by Akmalbek Abdusalomov, Sabina Umirzakova, Elbek Boymatov, Dilnoza Zaripova, Shukhrat Kamalov, Zavqiddin Temirov, Wonjun Jeong, Hyoungsun Choi, Taeg Keun Whangbo

    Published 2025-06-01
    “…Complementing this, an Adaptive Spectral Attention mechanism dynamically reweights each stream to amplify the most reliable facial features in real time. Unlike previous efforts that compartmentalize uncertainty handling, spectral blending, or computational thrift, HUE-Net unites all three in a lightweight package. …”
    Get full text
    Article
  7. 507
  8. 508

    A Hybrid CNN-LSTM Model With Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks by Pendukeni Phalaagae, Adamu Murtala Zungeru, Abid Yahya, Boyce Sigweni, Selvaraj Rajalakshmi

    Published 2025-01-01
    “…The framework’s resilience and adaptability underscore its potential for enhancing network security in real-world IoT applications by addressing evolving threats and computational constraints.…”
    Get full text
    Article
  9. 509
  10. 510
  11. 511

    CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People by Fahad Ashiq, Muhammad Asif, Maaz Bin Ahmad, Sadia Zafar, Khalid Masood, Toqeer Mahmood, Muhammad Tariq Mahmood, Ik Hyun Lee

    Published 2022-01-01
    “…The application uses MobileNet architecture due to its low computational complexity to run on low-power end devices. …”
    Get full text
    Article
  12. 512
  13. 513

    A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence by Abdullah Alabdulatif

    Published 2025-07-01
    “…The framework is deployed using a Flask-based web interface in the Amazon Elastic Compute Cloud environment, capturing live network traffic and offering sub-second inference with visual alerts. …”
    Get full text
    Article
  14. 514
  15. 515

    A Novel Dangerous Goods Detection Network Based on Multi-Layer Attention Mechanism in X-Ray Baggage Images by Xu Yang, Ting Lan, Yili Xu

    Published 2025-01-01
    “…In the network, a multilevel refinement (MR) module is designed to improve multi-level feature representation, enabling the network to capture varied goods sizes and overlapping structures effectively. …”
    Get full text
    Article
  16. 516
  17. 517

    Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space by Jian-hua LI

    Published 2016-02-01
    “…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
    Get full text
    Article
  18. 518
  19. 519
  20. 520