Showing 2,661 - 2,680 results of 5,074 for search 'features network (evolution OR evaluation)', query time: 0.22s Refine Results
  1. 2661

    A modified advanced encryption standard based on lora for monitoring and protecting distributed systems by Vineeth Vellora Veetil, Sophia Sudhir

    Published 2025-11-01
    “…In such an instance, system has the abilities to automatically cut and reconnect the electricity supply while also sending a notification to server. Using a network of IoT, energy consumptions are computed on its own, and the bill is modified online. …”
    Get full text
    Article
  2. 2662

    A hybrid inception-dilated-ResNet architecture for deep learning-based prediction of COVID-19 severity by Ali Khalili Fakhrabadi, Mehdi Jafari Shahbazzadeh, Nazanin Jalali, Mahdiyeh Eslami

    Published 2025-02-01
    “…Inception-Residual networks (Inception-ResNet), advanced hybrid models known for their compactness and effectiveness, were used to extract relevant features from CT scans. …”
    Get full text
    Article
  3. 2663

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  4. 2664

    Recognition of Visual Arabic Scripting News Ticker From Broadcast Stream by Moeen Tayyab, Ayyaz Hussain, Mohammed Ali Alshara, Shakir Khan, Reemiah Muneer Alotaibi, Abdul Rauf Baig

    Published 2022-01-01
    “…Moreover, our method is evaluated on a challenging Urdu Printed Text Images (UPTI) dataset that only provides ligature based annotations. …”
    Get full text
    Article
  5. 2665
  6. 2666

    Comparative analysis of data transformation methods for detecting non-technical losses in electricity grids by Maria Gabriel Chuwa, Daniel Ngondya, Rukia Mwifunyi

    Published 2025-09-01
    “…Convolutional neural networks (CNN) have emerged as effective tools for automatically extracting features from raw data, but raw data often lacks the structure needed for optimal feature extraction. …”
    Get full text
    Article
  7. 2667

    Anomaly Detection Dataset for Industrial Control Systems by Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, Hans Hansson

    Published 2023-01-01
    “…Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although a few commonly used datasets may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. …”
    Get full text
    Article
  8. 2668

    Graph learning based suicidal ideation detection via tree-drawing test by Ye Liu, Jiashuo Zheng, Yang Zeng, Fang Luo, Xuetao Tian, Xuetao Tian

    Published 2025-07-01
    “…To evaluate this method, a real dataset of 806 students from primary and secondary school in Shaanxi Province, China, is collected, and some metrics including macro-F1, G-mean, and false positive rate are used.ResultsThe results demonstrate that the proposed method significantly outperforms traditional machine learning and convolution neural network approaches. …”
    Get full text
    Article
  9. 2669

    An Optimized Transformer–GAN–AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets by Ahmad Salehiyan, Pardis Sadatian Moghaddam, Masoud Kaveh

    Published 2025-06-01
    “…To enhance the training and convergence of the GAN component, we integrate an improved chimp optimization algorithm (IChOA) for hyperparameter tuning and feature refinement. The proposed method is evaluated using three recent and comprehensive benchmark datasets, WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT, widely recognized as standard testbeds for IIoT intrusion detection research. …”
    Get full text
    Article
  10. 2670

    DeepRNAac4C: a hybrid deep learning framework for RNA N4-acetylcytidine site prediction by Guohua Huang, Guohua Huang, Runjuan Xiao, Runjuan Xiao, Chunying Peng, Jinyun Jiang, Weihong Chen

    Published 2025-08-01
    “…DeepRNAac4C integrates residual neural networks, convolutional neural networks (CNN), bidirectional long short-term memory networks (BiLSTM), and bidirectional gated recurrent units (BiGRU) to effectively capture both local and global sequence features. …”
    Get full text
    Article
  11. 2671

    Computer-aided diagnosis of lung nodule classification between benign nodule, primary lung cancer, and metastatic lung cancer at different image size using deep convolutional neura... by Mizuho Nishio, Osamu Sugiyama, Masahiro Yakami, Syoko Ueno, Takeshi Kubo, Tomohiro Kuroda, Kaori Togashi

    Published 2018-01-01
    “…We developed a computer-aided diagnosis (CADx) method for classification between benign nodule, primary lung cancer, and metastatic lung cancer and evaluated the following: (i) the usefulness of the deep convolutional neural network (DCNN) for CADx of the ternary classification, compared with a conventional method (hand-crafted imaging feature plus machine learning), (ii) the effectiveness of transfer learning, and (iii) the effect of image size as the DCNN input. …”
    Get full text
    Article
  12. 2672

    DynBlock: dynamic data encryption with Toffoli gate for IoT by Mubasher Haq, Ijaz Ali Shoukat, Alamgir Naushad, Mohsin Raza Jafri, Moid Sandhu, Abd Ullah Khan, Hyundong Shin

    Published 2025-05-01
    “…Abstract The emergence of 6G networks, coupled with the expansion of smart devices, necessitates robust and efficient cryptography solutions to ensure secure communication. …”
    Get full text
    Article
  13. 2673
  14. 2674

    Struct2SL: Synthetic lethality prediction based on AlphaFold2 structure information and Multilayer Perceptron by Yurui Huang, Ruzhe Yuan, Yaxuan Li, Zheming Xing, Junyi Li

    Published 2025-01-01
    “…By initiating at the protein feature stratum, Struct2SL offers a novel vantage point to refine the feature representation of gene interactions, thereby enabling more accurate predictions of prospective SL pairs. …”
    Get full text
    Article
  15. 2675
  16. 2676
  17. 2677
  18. 2678

    Dynamic and interpretable deep learning model for predicting respiratory failure following cardiac surgery by Man Xu, Hao Liu, Anran Dai, Qilian Tan, Xinlong Zhang, Rui Ding, Chen Chen, Jianjun Zou, Yongjun Li, Yanna Si

    Published 2025-08-01
    “…Five machine learning models, including logistic regression, multilayer perceptron, extreme gradient boosting, categorical boosting, and deep neural network (DNN), were trained using preoperative and intraoperative variables. …”
    Get full text
    Article
  19. 2679
  20. 2680