Search alternatives:
networks » network (Expand Search)
Showing 821 - 836 results of 836 for search 'Computer networks Security features.', query time: 0.09s Refine Results
  1. 821

    Through-wall Human Pose Reconstruction and Action Recognition Using Four-dimensional Imaging Radar by Rui ZHANG, Hanqin GONG, Ruiyuan SONG, Yadong LI, Zhi LU, Dongheng ZHANG, Yang HU, Yan CHEN

    Published 2025-02-01
    “…Through-wall human pose reconstruction and behavior recognition have enormous potential in fields like intelligent security and virtual reality. However, existing methods for through-wall human sensing often fail to adequately model four-Dimensional (4D) spatiotemporal features and overlook the influence of walls on signal quality. …”
    Get full text
    Article
  2. 822
  3. 823

    Comparative analysis of data-driven models on detection and classification of electrical faults in transmission systems: Explainability, applicability and industrial implications by Chibueze D. Ukwuoma, Dongsheng Cai, Chiagoziem C. Ukwuoma, Chinedu I. Otuka, Qi Huang

    Published 2025-08-01
    “…Hence, a Quadratic Discriminant Analysis by Projection (QDA-P) model which effectively captures non-linear relationships between electrical fault features is proposed, enhancing classification accuracy, less computationally complex and explainable for both binary and multi-class scenarios. …”
    Get full text
    Article
  4. 824
  5. 825

    An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm by Marwa Obayya, Fahd N. Al-Wesabi, Menwa Alshammeri, Huda G. Iskandar

    Published 2025-05-01
    “…Furthermore, the MobileNetV3 model is utilized for the feature extraction process. The temporal convolutional network (TCN) model is implemented for classification. …”
    Get full text
    Article
  6. 826

    Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints by Javad Forough, Hamed Haddadi, Monowar Bhuyan, Erik Elmroth

    Published 2024-01-01
    “…Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. …”
    Get full text
    Article
  7. 827
  8. 828

    SynAdult: Multimodal Synthetic Adult Dataset Generation via Diffusion Models and Neuromorphic Event Simulation for Critical Biometric Applications by Muhammad Ali Farooq, Paul Kielty, Wang Yao, Peter Corcoran

    Published 2025-01-01
    “…We further assess downstream applicability employing the state-of-the-art facial expression classification networks and event facial landmarks tests for downstream machine learning tasks. …”
    Get full text
    Article
  9. 829

    PHRF-RTDETR: a lightweight weed detection method for upland rice based on RT-DETR by Xianjin Jin, Jinheng Zhang, Fei Wang, Mengyan Zhao, Yunshuang Wang, Jianping Yang, Jinfeng Wu, Bing Zhou

    Published 2025-06-01
    “…To address this issue, we enhanced the baseline model RT-DETR and proposed a lightweight weed detection model for upland rice, named PHRF-RTDETR.MethodsFirst, we propose a novel lightweight backbone network, termed PGRNet, to replace the original computationally intensive feature extraction network in RT-DETR. …”
    Get full text
    Article
  10. 830

    Detectron2-enhanced mask R-CNN for precise instance segmentation of rice blast disease in Tanzania: Supporting timely intervention and data-driven severity assessment by Reuben Alfred, Judith Leo, Shubi F. Kaijage

    Published 2025-12-01
    “…Built on a ResNet-50 backbone with a Feature Pyramid Network (FPN), it achieved a mean average precision (mAP) of 89.4 %, with an AP50 of 94.6 % and an AP75 of 90.5 %. …”
    Get full text
    Article
  11. 831

    Signal-piloted processing and machine learning based efficient power quality disturbances recognition. by Saeed Mian Qaisar

    Published 2021-01-01
    “…Additionally, a reduced computational cost and latency of classifier is promised. …”
    Get full text
    Article
  12. 832

    Internet marketing organization with the use of intellegent and block chain technologies by U. A. Vishniakou

    Published 2020-05-01
    “…The objectives of the analysis are to identify trends in the development of Internet marketing in the digital economy with the use of intelligent and blockchain technologies, and to develop new structural solutions.The analysis of the use of intelligent technologies in marketing activities (MA) using cloud computing (CC) is carried out and its features are determined. …”
    Get full text
    Article
  13. 833

    Sea Surface Height Inversion Model Based on Multimodal Deep Learning for the Fusion of Heterogeneous FY-3E GNSS-R Data by Yun Zhang, Ganyao Qin, Shuhu Yang, Yanling Han, Zhonghua Hong

    Published 2025-01-01
    “…Traditional physical altimetry methods based on delay–Doppler mapping (DDM) are subject to errors that are difficult to correct computationally. The current deep-learning-based SSH inversion techniques primarily relying on single-modal data are unable to fully leverage the rich feature information from global navigation satellite system reflectometry (GNSS-R) remote sensing data, therefore limiting the potential accuracy improvement. …”
    Get full text
    Article
  14. 834

    A man–vehicle e-passport system using biometric blockchain for automated border control by Bing Xu, Ahmed Bouridane, Qiang Ni, Richard Jiang

    Published 2025-07-01
    “…Since the mid-1990s, the evolution of internet technologies has significantly transformed global connectivity and digital interaction. Today, advances in computing and networking continue to support the development of emerging paradigms such as the metaverse and digital twins—concepts that aspire to bridge physical and digital experiences. …”
    Get full text
    Article
  15. 835

    An Operational Status Assessment Model for SF<sub>6</sub> High-Voltage Circuit Breakers Based on IAR-BTR by Ningfang Wang, Yujia Wang, Yifei Zhang, Ci Tang, Chenhao Sun

    Published 2025-06-01
    “…The selected dataset is then normalized according to the input feature matrix. Secondly, conventional risk factors are extracted using traditional association rule mining techniques. …”
    Get full text
    Article
  16. 836