-
2661
A modified advanced encryption standard based on lora for monitoring and protecting distributed systems
Published 2025-11-01“…In such an instance, system has the abilities to automatically cut and reconnect the electricity supply while also sending a notification to server. Using a network of IoT, energy consumptions are computed on its own, and the bill is modified online. …”
Get full text
Article -
2662
A hybrid inception-dilated-ResNet architecture for deep learning-based prediction of COVID-19 severity
Published 2025-02-01“…Inception-Residual networks (Inception-ResNet), advanced hybrid models known for their compactness and effectiveness, were used to extract relevant features from CT scans. …”
Get full text
Article -
2663
Detection of SSL/TLS protocol attacks based on flow spectrum theory
Published 2022-02-01“…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
Get full text
Article -
2664
Recognition of Visual Arabic Scripting News Ticker From Broadcast Stream
Published 2022-01-01“…Moreover, our method is evaluated on a challenging Urdu Printed Text Images (UPTI) dataset that only provides ligature based annotations. …”
Get full text
Article -
2665
Towards precision agriculture: metaheuristic model compression for enhanced pest recognition
Published 2025-07-01Get full text
Article -
2666
Comparative analysis of data transformation methods for detecting non-technical losses in electricity grids
Published 2025-09-01“…Convolutional neural networks (CNN) have emerged as effective tools for automatically extracting features from raw data, but raw data often lacks the structure needed for optimal feature extraction. …”
Get full text
Article -
2667
Anomaly Detection Dataset for Industrial Control Systems
Published 2023-01-01“…Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although a few commonly used datasets may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. …”
Get full text
Article -
2668
Graph learning based suicidal ideation detection via tree-drawing test
Published 2025-07-01“…To evaluate this method, a real dataset of 806 students from primary and secondary school in Shaanxi Province, China, is collected, and some metrics including macro-F1, G-mean, and false positive rate are used.ResultsThe results demonstrate that the proposed method significantly outperforms traditional machine learning and convolution neural network approaches. …”
Get full text
Article -
2669
An Optimized Transformer–GAN–AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets
Published 2025-06-01“…To enhance the training and convergence of the GAN component, we integrate an improved chimp optimization algorithm (IChOA) for hyperparameter tuning and feature refinement. The proposed method is evaluated using three recent and comprehensive benchmark datasets, WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT, widely recognized as standard testbeds for IIoT intrusion detection research. …”
Get full text
Article -
2670
DeepRNAac4C: a hybrid deep learning framework for RNA N4-acetylcytidine site prediction
Published 2025-08-01“…DeepRNAac4C integrates residual neural networks, convolutional neural networks (CNN), bidirectional long short-term memory networks (BiLSTM), and bidirectional gated recurrent units (BiGRU) to effectively capture both local and global sequence features. …”
Get full text
Article -
2671
Computer-aided diagnosis of lung nodule classification between benign nodule, primary lung cancer, and metastatic lung cancer at different image size using deep convolutional neura...
Published 2018-01-01“…We developed a computer-aided diagnosis (CADx) method for classification between benign nodule, primary lung cancer, and metastatic lung cancer and evaluated the following: (i) the usefulness of the deep convolutional neural network (DCNN) for CADx of the ternary classification, compared with a conventional method (hand-crafted imaging feature plus machine learning), (ii) the effectiveness of transfer learning, and (iii) the effect of image size as the DCNN input. …”
Get full text
Article -
2672
DynBlock: dynamic data encryption with Toffoli gate for IoT
Published 2025-05-01“…Abstract The emergence of 6G networks, coupled with the expansion of smart devices, necessitates robust and efficient cryptography solutions to ensure secure communication. …”
Get full text
Article -
2673
Automated classification of chest X-rays: a deep learning approach with attention mechanisms
Published 2025-03-01Get full text
Article -
2674
Struct2SL: Synthetic lethality prediction based on AlphaFold2 structure information and Multilayer Perceptron
Published 2025-01-01“…By initiating at the protein feature stratum, Struct2SL offers a novel vantage point to refine the feature representation of gene interactions, thereby enabling more accurate predictions of prospective SL pairs. …”
Get full text
Article -
2675
-
2676
-
2677
A Systematic Survey of AI Models in Financial Market Forecasting for Profitability Analysis
Published 2023-01-01Get full text
Article -
2678
Dynamic and interpretable deep learning model for predicting respiratory failure following cardiac surgery
Published 2025-08-01“…Five machine learning models, including logistic regression, multilayer perceptron, extreme gradient boosting, categorical boosting, and deep neural network (DNN), were trained using preoperative and intraoperative variables. …”
Get full text
Article -
2679
Dynamic alterations of SEEG characteristics during peri-ictal period and localization of seizure onset zone
Published 2025-09-01Get full text
Article -
2680
Sex hormones shape EEG-based functional connectivity in early-stage Parkinson’s disease patients
Published 2025-01-01“…PD exhibited a hypoconnected network at θ and α bands and a hyperconnected network at β band compared to HC. …”
Get full text
Article