Showing 821 - 836 results of 836 for search 'computer network security features.', query time: 0.11s Refine Results
  1. 821

    Classification Model for Bot-IoT Attack Detection Using Correlation and Analysis of Variance by Firgiawan Faira, Dandy Pramana Hostiadi

    Published 2025-04-01
    “…Industry 4.0 requires secure networks as the advancements in IoT and AI exacerbate the challenges and vulnerabilities in data security. …”
    Get full text
    Article
  2. 822

    Signal-piloted processing and machine learning based efficient power quality disturbances recognition. by Saeed Mian Qaisar

    Published 2021-01-01
    “…Additionally, a reduced computational cost and latency of classifier is promised. …”
    Get full text
    Article
  3. 823

    Internet marketing organization with the use of intellegent and block chain technologies by U. A. Vishniakou

    Published 2020-05-01
    “…The objectives of the analysis are to identify trends in the development of Internet marketing in the digital economy with the use of intelligent and blockchain technologies, and to develop new structural solutions.The analysis of the use of intelligent technologies in marketing activities (MA) using cloud computing (CC) is carried out and its features are determined. …”
    Get full text
    Article
  4. 824

    Detectron2-enhanced mask R-CNN for precise instance segmentation of rice blast disease in Tanzania: Supporting timely intervention and data-driven severity assessment by Reuben Alfred, Judith Leo, Shubi F. Kaijage

    Published 2025-12-01
    “…Built on a ResNet-50 backbone with a Feature Pyramid Network (FPN), it achieved a mean average precision (mAP) of 89.4 %, with an AP50 of 94.6 % and an AP75 of 90.5 %. …”
    Get full text
    Article
  5. 825

    Sea Surface Height Inversion Model Based on Multimodal Deep Learning for the Fusion of Heterogeneous FY-3E GNSS-R Data by Yun Zhang, Ganyao Qin, Shuhu Yang, Yanling Han, Zhonghua Hong

    Published 2025-01-01
    “…Traditional physical altimetry methods based on delay–Doppler mapping (DDM) are subject to errors that are difficult to correct computationally. The current deep-learning-based SSH inversion techniques primarily relying on single-modal data are unable to fully leverage the rich feature information from global navigation satellite system reflectometry (GNSS-R) remote sensing data, therefore limiting the potential accuracy improvement. …”
    Get full text
    Article
  6. 826

    Optimized Ensemble Deep Learning for Real-Time Intrusion Detection on Resource-Constrained Raspberry Pi Devices by Muhammad Bisri Musthafa, Samsul Huda, Tuy Tan Nguyen, Yuta Kodera, Yasuyuki Nogami

    Published 2025-01-01
    “…The rapid growth of Internet of Things (IoT) networks has increased security risks, making it essential to have effective Intrusion Detection Systems (IDS) for real-time threat detection. …”
    Get full text
    Article
  7. 827
  8. 828
  9. 829

    Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis by Lana V Ivanitskaya, Dimitrios Zikos, Elina Erzikova

    Published 2025-06-01
    “…Different types of eHealth apps were supported by research on infrastructures: networks, data exchange, computing technologies, information systems, and platforms. …”
    Get full text
    Article
  10. 830

    Enhancing Online Fraud Detection: Leveraging Machine Learning and Behavioral Indicators for Improved Accuracy and Real-Time Detection by Shaha Prasad, Gavekar Vidya

    Published 2025-01-01
    “…The study also highlights the importance of feature selection, class imbalance handling, and real-world applicability by discussing computational efficiency and deployment challenges. …”
    Get full text
    Article
  11. 831

    Deep Learning-Based Atmospheric Visibility Detection by Yawei Qu, Yuxin Fang, Shengxuan Ji, Cheng Yuan, Hao Wu, Shengbo Zhu, Haoran Qin, Fan Que

    Published 2024-11-01
    “…This paper systematically reviews the applications of various deep learning models—Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Generative Adversarial Networks (GANs), and Transformer networks—in visibility estimation, prediction, and enhancement. …”
    Get full text
    Article
  12. 832

    A man–vehicle e-passport system using biometric blockchain for automated border control by Bing Xu, Ahmed Bouridane, Qiang Ni, Richard Jiang

    Published 2025-07-01
    “…Since the mid-1990s, the evolution of internet technologies has significantly transformed global connectivity and digital interaction. Today, advances in computing and networking continue to support the development of emerging paradigms such as the metaverse and digital twins—concepts that aspire to bridge physical and digital experiences. …”
    Get full text
    Article
  13. 833

    Editorial by Teddy Surya Gunawan

    Published 2025-05-01
    “…The most significant representation comes from Electrical, Computer, and Communications Engineering, where numerous works delve into AI, signal processing, secure communications, and sensor networks. …”
    Get full text
    Article
  14. 834

    SynAdult: Multimodal Synthetic Adult Dataset Generation via Diffusion Models and Neuromorphic Event Simulation for Critical Biometric Applications by Muhammad Ali Farooq, Paul Kielty, Wang Yao, Peter Corcoran

    Published 2025-01-01
    “…We further assess downstream applicability employing the state-of-the-art facial expression classification networks and event facial landmarks tests for downstream machine learning tasks. …”
    Get full text
    Article
  15. 835

    Comparative analysis of data-driven models on detection and classification of electrical faults in transmission systems: Explainability, applicability and industrial implications by Chibueze D. Ukwuoma, Dongsheng Cai, Chiagoziem C. Ukwuoma, Chinedu I. Otuka, Qi Huang

    Published 2025-08-01
    “…Hence, a Quadratic Discriminant Analysis by Projection (QDA-P) model which effectively captures non-linear relationships between electrical fault features is proposed, enhancing classification accuracy, less computationally complex and explainable for both binary and multi-class scenarios. …”
    Get full text
    Article
  16. 836

    An Operational Status Assessment Model for SF<sub>6</sub> High-Voltage Circuit Breakers Based on IAR-BTR by Ningfang Wang, Yujia Wang, Yifei Zhang, Ci Tang, Chenhao Sun

    Published 2025-06-01
    “…With the rapid advancement of digitalization and intelligence in power systems, SF<sub>6</sub> high-voltage circuit breakers, as the core switching devices in power grid protection systems, have become critical components in high-voltage networks of 110 kV and above due to their superior insulation performance and exceptional arc-quenching capability. …”
    Get full text
    Article