Search alternatives:
networks » network (Expand Search)
Showing 801 - 820 results of 836 for search 'Computer networks Security features.', query time: 0.17s Refine Results
  1. 801

    Enhancing Online Fraud Detection: Leveraging Machine Learning and Behavioral Indicators for Improved Accuracy and Real-Time Detection by Shaha Prasad, Gavekar Vidya

    Published 2025-01-01
    “…The study also highlights the importance of feature selection, class imbalance handling, and real-world applicability by discussing computational efficiency and deployment challenges. …”
    Get full text
    Article
  2. 802

    MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism by Yongzong Lu, Pengfei Liu, Chong Tan

    Published 2025-06-01
    “…To address the high computational complexity and inadequate feature representation in traditional convolutional networks, this study proposes MA-YOLO, an agricultural pest detection model based on multi-scale fusion and attention mechanisms. …”
    Get full text
    Article
  3. 803
  4. 804
  5. 805

    LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification by Yongqi Xu, Dongcheng Li, Changcheng Li, Zheming Yuan, Zhijun Dai

    Published 2025-08-01
    “…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
    Get full text
    Article
  6. 806

    A survey of data-driven fault-diagnosis methods for large-scale industrial production processes by Qianxiang YU, Qing LI, Linlin LI, Yixuan WANG

    Published 2025-04-01
    “…The usual fault-diagnosis methods for large-scale systems rely on centralized sensor network monitoring. Centralization necessitates consolidated data processing, which can create immense computational stress. …”
    Get full text
    Article
  7. 807

    Constructing segmentation method for wheat powdery mildew using deep learning by Hecang Zang, Hecang Zang, Congsheng Wang, Qing Zhao, Qing Zhao, Jie Zhang, Jie Zhang, Junmei Wang, Guoqing Zheng, Guoqing Zheng, Guoqiang Li, Guoqiang Li

    Published 2025-05-01
    “…Finally, in the deep bottleneck of Swin-Unet network, ResNet network layers are used to increase the expressive power of feature. …”
    Get full text
    Article
  8. 808

    A hybrid data-driven method for voltage state prediction and fault warning of Li-ion batteries by Yufeng Huang, Xuejian Gong, Zhiyu Lin, Lei Xu

    Published 2024-12-01
    “…Firstly, an 1DCNN module is introduced to extract voltage-related multi-dimension features. Secondly, a Bi-LSTM module is used to learn long-term dependence relationships among fused features while integrating a self-attention mechanism. …”
    Get full text
    Article
  9. 809

    Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption by Jeyamala Chandrasekaran, S. J. Thiruvengadam

    Published 2015-01-01
    “…Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. …”
    Get full text
    Article
  10. 810
  11. 811
  12. 812
  13. 813

    Improving internet of vehicles research: A systematic preprocessing framework for the VeReMi datasetZenodo by Aparup Roy, Debotosh Bhattacharjee, Ondrej Krejcar

    Published 2025-06-01
    “…The optimized dataset is well-suited for ITS and IoV applications, such as anomaly detection and network security, underscoring the crucial role of preprocessing in overcoming real-world constraints and enhancing model performance.…”
    Get full text
    Article
  14. 814

    Fractional Artificial Protozoa Optimization Enabled Deep Learning for Intrusion Detection and Mitigation in Cyber-Physical Systems by Shaik Abdul Rahim, Arun Manoharan

    Published 2024-01-01
    “…CPSs are gradually growing and utilized in important infrastructure and industries for attaining smart grid, smart transportation, and smart healthcare, which assists governments and citizens. Nevertheless, the network and wireless communication technology creates high complexity, and the intelligence and dynamic of network intrusions make CPS more insecure to network intrusions and provide more critical threats to human life and national security. …”
    Get full text
    Article
  15. 815

    InterAcT: A generic keypoints-based lightweight transformer model for recognition of human solo actions and interactions in aerial videos. by Mubashir Shah, Tahir Nawaz, Rab Nawaz, Nasir Rashid, Muhammad Osama Ali

    Published 2025-01-01
    “…To this end, this paper presents a generic lightweight and computationally efficient Transformer network-based model, referred to as InterAcT, that relies on extracted bodily keypoints using YOLO v8 to recognize human solo actions as well as interactions in aerial videos. …”
    Get full text
    Article
  16. 816

    Survey of deep fake audio generation and detection techniques by ZENG Zhiping, ZHANG Xulong, QU Xiaoyang, XIAO Chunguang, WANG Jianzong

    Published 2025-01-01
    “…Subsequently, an in-depth analysis was conducted on both acoustic feature-based and end-to-end model-based fake audio detection strategies, delving into details such as deep acoustic feature detection, pre-trained neural network feature detection, end-to-end model optimization, generalization enhancement techniques, and the enhancement of real-time detection. …”
    Get full text
    Article
  17. 817

    Editorial by Teddy Surya Gunawan

    Published 2025-05-01
    “…The most significant representation comes from Electrical, Computer, and Communications Engineering, where numerous works delve into AI, signal processing, secure communications, and sensor networks. …”
    Get full text
    Article
  18. 818

    Issues, Challenges, and Solution Options for On-Grid Multi-Microgrid Game Theory: A Systematic Review by Dimas Jalaluddin Ahmad, Nanang Hariyanto, Umar Khayam

    Published 2025-01-01
    “…This connection provides more flexibility in operation and various features, including multi-level interactions beyond peer-to-peer, asymmetric agents, the presence of distribution network operator, support and backup power from the grid, and an energy market pool. …”
    Get full text
    Article
  19. 819
  20. 820