-
801
Enhancing Online Fraud Detection: Leveraging Machine Learning and Behavioral Indicators for Improved Accuracy and Real-Time Detection
Published 2025-01-01“…The study also highlights the importance of feature selection, class imbalance handling, and real-world applicability by discussing computational efficiency and deployment challenges. …”
Get full text
Article -
802
MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism
Published 2025-06-01“…To address the high computational complexity and inadequate feature representation in traditional convolutional networks, this study proposes MA-YOLO, an agricultural pest detection model based on multi-scale fusion and attention mechanisms. …”
Get full text
Article -
803
-
804
OPTISTACK: A Hybrid Ensemble Learning and XAI-Based Approach for Malware Detection in Compressed Files
Published 2025-01-01Get full text
Article -
805
LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification
Published 2025-08-01“…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
Get full text
Article -
806
A survey of data-driven fault-diagnosis methods for large-scale industrial production processes
Published 2025-04-01“…The usual fault-diagnosis methods for large-scale systems rely on centralized sensor network monitoring. Centralization necessitates consolidated data processing, which can create immense computational stress. …”
Get full text
Article -
807
Constructing segmentation method for wheat powdery mildew using deep learning
Published 2025-05-01“…Finally, in the deep bottleneck of Swin-Unet network, ResNet network layers are used to increase the expressive power of feature. …”
Get full text
Article -
808
A hybrid data-driven method for voltage state prediction and fault warning of Li-ion batteries
Published 2024-12-01“…Firstly, an 1DCNN module is introduced to extract voltage-related multi-dimension features. Secondly, a Bi-LSTM module is used to learn long-term dependence relationships among fused features while integrating a self-attention mechanism. …”
Get full text
Article -
809
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
Published 2015-01-01“…Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. …”
Get full text
Article -
810
Machine Learning and Deep Learning for Crop Disease Diagnosis: Performance Analysis and Review
Published 2024-12-01Get full text
Article -
811
DMN-YOLO: A Robust YOLOv11 Model for Detecting Apple Leaf Diseases in Complex Field Conditions
Published 2025-05-01Get full text
Article -
812
Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection
Published 2025-07-01Get full text
Article -
813
Improving internet of vehicles research: A systematic preprocessing framework for the VeReMi datasetZenodo
Published 2025-06-01“…The optimized dataset is well-suited for ITS and IoV applications, such as anomaly detection and network security, underscoring the crucial role of preprocessing in overcoming real-world constraints and enhancing model performance.…”
Get full text
Article -
814
Fractional Artificial Protozoa Optimization Enabled Deep Learning for Intrusion Detection and Mitigation in Cyber-Physical Systems
Published 2024-01-01“…CPSs are gradually growing and utilized in important infrastructure and industries for attaining smart grid, smart transportation, and smart healthcare, which assists governments and citizens. Nevertheless, the network and wireless communication technology creates high complexity, and the intelligence and dynamic of network intrusions make CPS more insecure to network intrusions and provide more critical threats to human life and national security. …”
Get full text
Article -
815
InterAcT: A generic keypoints-based lightweight transformer model for recognition of human solo actions and interactions in aerial videos.
Published 2025-01-01“…To this end, this paper presents a generic lightweight and computationally efficient Transformer network-based model, referred to as InterAcT, that relies on extracted bodily keypoints using YOLO v8 to recognize human solo actions as well as interactions in aerial videos. …”
Get full text
Article -
816
Survey of deep fake audio generation and detection techniques
Published 2025-01-01“…Subsequently, an in-depth analysis was conducted on both acoustic feature-based and end-to-end model-based fake audio detection strategies, delving into details such as deep acoustic feature detection, pre-trained neural network feature detection, end-to-end model optimization, generalization enhancement techniques, and the enhancement of real-time detection. …”
Get full text
Article -
817
Editorial
Published 2025-05-01“…The most significant representation comes from Electrical, Computer, and Communications Engineering, where numerous works delve into AI, signal processing, secure communications, and sensor networks. …”
Get full text
Article -
818
Issues, Challenges, and Solution Options for On-Grid Multi-Microgrid Game Theory: A Systematic Review
Published 2025-01-01“…This connection provides more flexibility in operation and various features, including multi-level interactions beyond peer-to-peer, asymmetric agents, the presence of distribution network operator, support and backup power from the grid, and an energy market pool. …”
Get full text
Article -
819
An effective PO-RSNN and FZCIS based diabetes prediction and stroke analysis in the metaverse environment
Published 2025-04-01Get full text
Article -
820
Crop yield prediction using machine learning: An extensive and systematic literature review
Published 2025-03-01Get full text
Article