-
601
-
602
-
603
Mobile Accelerometer Applications in Core Muscle Rehabilitation and Pre-Operative Assessment
Published 2024-11-01Get full text
Article -
604
-
605
-
606
-
607
Deep CNN based brain tumor detection in intelligent systems
Published 2024-01-01Get full text
Article -
608
-
609
Optimal Partitioning of Unbalanced Datasets for BGP Anomaly Detection
Published 2025-04-01Get full text
Article -
610
Online Face Detection and Recognition in a Video Stream
Published 2013-12-01“…In this work a system is designed for Online Face Detection and Recognition depending on multiple algorithms that are: AdaBoost algorithm for the face detection and the two algorithms Principle Component Analysis (PCA) and Linear Discriminate Analysis (LDA) to extract features and use back propagation neural network in recognition. …”
Get full text
Article -
611
-
612
Ensemble-RNN: A Robust Framework for DDoS Detection in Cloud Environment
Published 2023-12-01“…These selected features are then used to classify the network traffic as either normal or attack, employing RNN. …”
Get full text
Article -
613
-
614
DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model
Published 2024-11-01“…The model integrates several innovations, including the application of a Re-parameterization Cross-Stage Efficient Layered Attention Network (RCELAN) and a Bidirectional Feature Pyramid Network (BiFPN), to enhance feature processing capabilities while maintaining a lightweight design. …”
Get full text
Article -
615
YOLO-SMUG: An Efficient and Lightweight Infrared Object Detection Model for Unmanned Aerial Vehicles
Published 2025-03-01Get full text
Article -
616
Malicious Traffic Detection on Tofino Using Graph Attention Model
Published 2025-06-01Get full text
Article -
617
Performance Evaluation of Various Deep Learning Models in Gait Recognition Using the CASIA-B Dataset
Published 2024-12-01Get full text
Article -
618
Enhancing plant disease detection through deep learning: a Depthwise CNN with squeeze and excitation integration and residual skip connections
Published 2025-01-01“…The architectural modifications are specifically designed to enhance feature extraction and classification performance, all while maintaining computational efficiency. …”
Get full text
Article -
619
-
620
Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment
Published 2025-01-01“…The Internet of Things (IoT) system has been developed to create a smart environment. Privacy and security are critical issues in IoT systems. Security vulnerabilities in IoT-enabled models generate threats that impact various applications. …”
Get full text
Article