-
161
Coupling Heterogeneous Neural Networks With Memristors
Published 2025-01-01“…The performance analysis of encrypted images demonstrates that the algorithm offers strong robustness during transmission and effective resistance against attacks, ensuring privacy and security.…”
Get full text
Article -
162
Robust Abnormal Event Recognition via Motion and Shape Analysis at ATM Installations
Published 2015-01-01“…However, this convenience is marred by criminal activities like money snatching and attack on customers, which are increasingly affecting the security of bank customers. …”
Get full text
Article -
163
-
164
An Evaluation of White Matter Intensities in Patients with Pediatric Migraine
Published 2025-01-01“…There was no significant relationship between hyperintensity in migraine patients and attack duration or frequency. Analysis also revealed no significant difference in terms of hyperintensity volumes (mm<sup>3</sup>) between the study group (19.73 ± 24.26) and the control group (5.62 ± 1.83). …”
Get full text
Article -
165
ANALYSIS OF DISEASE SEVERITY ON CITRUS LEAVES (CITRUS spp.) USING IMAGEJ AND PLANTIX SOFTWARE
Published 2023-07-01Get full text
Article -
166
Face-work in North American Presidential Debates: A Corpus-based Multi-theoretical Approach
Published 2024-07-01“…This paper presents a corpus-based three-fold analysis blending qualitative, quantitative and statistical methodologies to observe the evolution of facework in this context, focusing on impoliteness and image restoration manifestations. …”
Get full text
Article -
167
A secure and imperceptible communication system for sharing co-ordinate data
Published 2025-07-01“…The mean square error (MSE) was consistently below 0.001, and histogram analysis confirmed visual consistency between cover and stego images. …”
Get full text
Article -
168
Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator
Published 2024-01-01Get full text
Article -
169
Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
Published 2023-12-01Get full text
Article -
170
-
171
-
172
-
173
An analysis of social media content shared by right-wing extremist groups in the United States, the Great Britain and Australia
Published 2023-06-01“…The extreme right movements have increasingly appeared on social media, especially on Twitter and Facebook, coinciding with the 2019 New Zealand attack, the 2019 El Paso incident, and Britain’s exit from the European Union in 2020. …”
Get full text
Article -
174
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications
Published 2025-07-01“…Security analysis validates robustness against various attacks, with NIST statistical tests confirming ICC-PRNG effectiveness. …”
Get full text
Article -
175
Shared neural signatures of photophobia in migraine and post-traumatic headache: a task-based fMRI study
Published 2025-07-01“…These patterns parallel those observed during migraine attacks, indicating shared neural mechanisms between the two headache disorders.…”
Get full text
Article -
176
-
177
The New York Times on The NATO bombing of FR Yugoslavia in 1999
Published 2025-01-01Get full text
Article -
178
Verifying Robustness of Neural Networks in Vision-Based End-to-End Autonomous Driving
Published 2025-01-01“…The main contributions of this work are: i) We provide a comprehensive analysis of current neural-network-based perception and decision-making components in autonomous vehicles, highlighting their susceptibility to attacks or perturbation. ii) We develop and implement a novel framework for systematically evaluating and verifying the robustness of neural networks against such perturbations, focusing on imperceptible image modifications. iii) We present empirical results demonstrating our verification framework’s effectiveness in identifying weaknesses and providing probabilistic guarantees on network behavior. …”
Get full text
Article -
179
Multimodal malware classification using proposed ensemble deep neural network framework
Published 2025-05-01“…This collaborative approach is the least addressed and pivotal for protecting against the advancing environment of modern malware attacks. This study presents a state-of-the-art malware analysis framework that employs a multimodal approach by integrating malware images and numeric features for effective malware classification. …”
Get full text
Article -
180
Automatic plant disease detection using computationally efficient convolutional neural network
Published 2024-12-01Get full text
Article