-
1201
Insights into hepatic angiomyolipoma: A case report highlighting scannographic findings
Published 2025-06-01Get full text
Article -
1202
-
1203
Deep learning-based prediction of multi-level just noticeable distortion
Published 2024-01-01Get full text
Article -
1204
Comparative analysis of random forest and deep learning approaches for automated acute lymphoblastic leukemia detection using morphologicaland textural features
Published 2025-07-01“…We propose: (1) a Random Forest classifier using carefully engineered morphological and textural features, and (2) a Convolutional Neural Network (CNN)architecture for automated feature learning from microscopic blood cell images. …”
Get full text
Article -
1205
Engineered feature embeddings meet deep learning: A novel strategy to improve bone marrow cell classification and model transparency
Published 2024-12-01“…Cytomorphology evaluation of bone marrow cell is the initial step to diagnose different hematological diseases. …”
Get full text
Article -
1206
A Dual-channel Progressive Graph Convolutional Network via subgraph sampling
Published 2024-07-01“…To enhance the representation power, we construct a dual channel fusion module by using both the geometric information of the node feature and the original topology. Specifically, we evaluate the complementary information of the dual channels based on the joint entropy between the feature information and the adjacency matrix, and effectively reduce the information redundancy by reasonably selecting the feature information. …”
Get full text
Article -
1207
A Composite Recognition Method Based on Multimode Mutual Attention Fusion Network
Published 2025-12-01“…The study begins with the construction of pixel-level fusion networks, feature-weighted fusion networks and the multimode mutual attention fusion network. …”
Get full text
Article -
1208
PB-STR: A spatiotemporal transformer network for multi-behavior recognition of pigs
Published 2025-12-01Get full text
Article -
1209
An Improved Crop Disease Identification Method Based on Lightweight Convolutional Neural Network
Published 2022-01-01“…To address these issues, an improved crop disease identification method based on convolutional neural network is proposed to process images of crops for identifying diseases. …”
Get full text
Article -
1210
Research on Sentiment Tendency and Evolution of Public Opinions in Social Networks of Smart City
Published 2020-01-01“…Then, four hot events were randomly selected from the microblog as datasets to evaluate the TSTS model in terms of topic feature extraction, sentiment analysis, and time change. …”
Get full text
Article -
1211
An optimized stacking-based TinyML model for attack detection in IoT networks.
Published 2025-01-01“…Some amount of data preprocessing has been done applying methods such as label encoding, feature selection, and data standardization. A stacking ensemble learning technique uses multiple models combining lightweight Decision Tree (DT) and small Neural Network (NN) to aggregate power of the system and generalize. …”
Get full text
Article -
1212
Adaptive Context-Aware Generative Adversarial Network for Low-quality Image Enhancement
Published 2025-06-01“…FGAN-DA comprises the dual attention feature extraction, invertible flow generation network, the Markov discriminant network. …”
Get full text
Article -
1213
Research on incentive mechanism integrated trust management for P2P networks
Published 2011-01-01“…An important challenge regarding peers’ trust valuation in peer-to-peer(P2P) systems was how to cope with such issues as dishonest feedbacks from malicious peers,collusions and complicatedly strategic frauds to the trust model itself,which could not be effectively tackled by the existing solutions.Thus,an incentive mechanism integrated trust management model for P2P networks,(IMTM) was proposed,to quantify and evaluate the trustworthiness of peers.Moreover,the related definitions and distributed implementation strategies of IMTM was also given.In IMTM,the recommendation credibility,composed of three factors,including the similarity characteristics,the altering scope of interaction experiences and the time fading feature of trust when interacting,was introduced to portray the extent to which the trustor trusted another recommender’s recommendations.Besides,the trusted service persistent intensity was imported to this model to promote peers to provide high-quality services to others continuously,and the risk mechanism was used to improve the sensitivity of this model.Additionally,based on the trust model,an adaptive reputation based incentive mechanism was presented.Through this mechanism,trusted peers could migrate to the centric position,while untrusted peers to the edge of the topology,incenting peers to provide more high-quality services in order to get more return on services.Theoretical analyses and experimental results demonstrate that IMTM has advantages in combating such malicious behaviors as the dishonest recommendations from malicious peers,collusions and the complicatedly strategic attacks to the trust model itself over the existing models,and show more adaptability,sensitivity and effectiveness.…”
Get full text
Article -
1214
Securing Automotive Networks from DoS and Fuzzy Attacks with Optimized LSTM Models
Published 2025-04-01“…Abstract Intelligently connected automobiles have come a long way thanks to the deep integration of cutting-edge networked gadgets and advancements in automotive technology. …”
Get full text
Article -
1215
Cross-Scale Hypergraph Neural Networks with Inter–Intra Constraints for Mitosis Detection
Published 2025-07-01“…To address these limitations, we conducted an in-depth analysis of existing models and propose an Inter–Intra Hypergraph Neural Network (II-HGNN). Our model introduces a block-based feature extraction mechanism to efficiently capture deep representations. …”
Get full text
Article -
1216
DeepQSP: Identification of Quorum Sensing Peptides Through Neural Network Model
Published 2024-12-01“…This study introduces DeepQSP, a novel technique for QSP identification, which combines Latent Semantic Analysis (LSA), a word embedding feature extraction method, with classical amino acid-based extraction Pseudo Amino Acid Composition (PAAC), and a convolutional neural network (CNN) classifier. …”
Get full text
Article -
1217
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
Published 2021-06-01“…To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to evaluate the pronunciation of the Arabic alphabet. …”
Get full text
Article -
1218
An Efficient Deep Learning-Based Framework for Predicting Cyber Violence in Social Networks
Published 2025-01-01“…The Jaccard similarity metric is employed to construct neighborhoods of input texts, allowing the model to leverage surrounding context for improved feature extraction. The proposed model combines Bi-LSTM and GRU networks to capture both sequential dependencies and contextual relationships effectively. …”
Get full text
Article -
1219
Exploring the performance of LBP-capsule networks with K-Means routing on complex images
Published 2022-06-01“…Capsule Networks (CapsNets) were proposed to mitigate the shortcomings of Convolutional Neural Networks (CNNs) such as invariance. …”
Get full text
Article -
1220
Protecting IOT Networks Through AI-Based Solutions and Fractional Tchebichef Moments
Published 2025-06-01“…The effectiveness of our proposed technique for detecting IoT threats was evaluated using the UNSW-NB15 and Bot-IoT datasets, featuring illustrative cases of common IoT attack scenarios, such as DDoS, identity spoofing, network reconnaissance, and unauthorized data access. …”
Get full text
Article