Showing 1 - 20 results of 34 for search 'host convolutional', query time: 0.13s Refine Results
  1. 1

    Flu-CNN: identifying host specificity of Influenza A virus using convolutional networks by Mingda Hu, Nan Luo, Boqian Wang, Renjie Meng, Yunxiang Zhao, Zili Chai, Yuan Jin, Junjie Yue, Xin Wang, Wei Chen, Hongguang Ren

    Published 2025-08-01
    “…To address this, we proposed Flu-level Convolutional Neural Networks (Flu-CNN), a model designed to analyze genomic segments and identify IAV host specificity, with a particular focus on avian influenza viruses that could potentially infect humans. …”
    Get full text
    Article
  2. 2

    Convolutional neural network analysis of optical texture patterns in liquid-crystal skyrmions by J. Terroa, M. Tasinkevych, C. S. Dias

    Published 2025-03-01
    “…In addition to well studied singular defects such as point or line disclinations, liquid crystals can also host non-singular solitonic defects such as skyrmions, hopfions, and torons. …”
    Get full text
    Article
  3. 3

    A novel approach for detecting malicious hosts based on RE-GCN in intranet by Haochen Xu, Xiaoyu Geng, Junrong Liu, Zhigang Lu, Bo Jiang, Yuling Liu

    Published 2024-12-01
    “…For malicious host detection, this paper proposes the Relational-Edge Graph Convolutional Network (RE-GCN) model, which can directly aggregate and learn features on edges and use them to accurately classify nodes, compared to other GNN models. …”
    Get full text
    Article
  4. 4

    Measurement of Fracture Networks in Rock Sample by X-Ray Tomography, Convolutional Filtering and Deep Learning by Alessia Caputo, Maria Teresa Calcagni, Giovanni Salerno, Elisa Mammoliti, Paolo Castellini

    Published 2025-07-01
    “…The neural network segmentation demonstrated superior capability in distinguishing fractures filled with various materials from the host rock, overcoming the limitations observed in traditional convolution-based methods. …”
    Get full text
    Article
  5. 5

    Convolution neural network and 77 ​GHz millimeter wave radar based intelligent liquid classification system by Jiayu Chen, Xinhuai Wang, Yin Xu, Ye Peng, Wen Wang, Junyan Xiang, Qihang Xu

    Published 2023-11-01
    “…An intelligent liquid classification system based on 77 ​GHz ​millimeter wave radar and convolution neural network are proposed in this paper. …”
    Get full text
    Article
  6. 6
  7. 7

    Vowel classification with combining pitch detection and one‐dimensional convolutional neural network based classifier for gender identification by Chia‐Hung Lin, Hsiang‐Yueh Lai, Ping‐Tzan Huang, Pi‐Yun Chen, Chien‐Ming Li

    Published 2023-05-01
    “…Then, in vowel voice signal classification, a one‐dimensional (1D) convolutional neural network (CNN), consisted of a multi‐round 1D kernel convolutional layer, a 1D pooling process, and a vowel classifier that could preliminary divide feature patterns into three level ranges of F0, including adult and children groups. …”
    Get full text
    Article
  8. 8

    MEMPSEP‐I. Forecasting the Probability of Solar Energetic Particle Event Occurrence Using a Multivariate Ensemble of Convolutional Neural Networks by Subhamoy Chatterjee, Maher A. Dayeh, Andrés Muñoz‐Jaramillo, Hazel M. Bain, Kimberly Moreland, Samuel Hart

    Published 2024-09-01
    “…Abstract The Sun continuously affects the interplanetary environment through a host of interconnected and dynamic physical processes. …”
    Get full text
    Article
  9. 9

    A computational framework for processing time-series of earth observation data based on discrete convolution: global-scale historical Landsat cloud-free aggregates at 30 m spatial... by Davide Consoli, Leandro Parente, Rolf Simoes, Murat Şahin, Xuemeng Tian, Martijn Witjes, Lindsey Sloat, Tomislav Hengl

    Published 2024-12-01
    “…To further limit the storage size the produced data was saved as 8-bit Cloud-Optimized GeoTIFFs (COG). With the hosting of about 20 TB per band/index for an entire 30 m resolution bi-monthly historical time-series distributed as open data, the product enables seamless, fast, and affordable access to the Landsat archive for environmental monitoring and analysis applications.…”
    Get full text
    Article
  10. 10
  11. 11

    Text analysis of DNS queries for data exfiltration protection of computer networks by Ya. V. Bubnov, N. N. Ivanov

    Published 2020-09-01
    “…The DNS requests that transfer stolen information from a host infected by malicious software to an external host controlled by a malefactor are considered. …”
    Get full text
    Article
  12. 12

    New Rotation Periods from the Kepler Bonus Background Light Curves by Zachary R. Claytor, Jamie Tayar

    Published 2025-01-01
    “…The Kepler field hosts the best-studied sample of field star rotation periods. …”
    Get full text
    Article
  13. 13

    A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE by Vanlalruata Hnamte, Hong Nhung-Nguyen, Jamal Hussain, Yong Hwa-Kim

    Published 2023-01-01
    “…Machine learning and deep learning techniques are widely used to evaluate intrusion detection systems (IDS) capable of rapidly and automatically recognizing and classifying cyber-attacks on networks and hosts. However, when destructive attacks are becoming more extensive, more challenges develop, needing a comprehensive response. …”
    Get full text
    Article
  14. 14

    HIDS-IoMT: A Deep Learning-Based Intelligent Intrusion Detection System for the Internet of Medical Things by Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi

    Published 2025-01-01
    “…The proposed model hybridizes the Convolutional Neural Network (CNN) for feature extraction and the Long Short Term Memory neural network (LSTM) for sequence data prediction. …”
    Get full text
    Article
  15. 15

    An Uncertainty-Aware Lane Change Motion Planning Algorithm Based on Probabilistic Trajectory Prediction Distribution by Zhiqiang Zhang, Lei Zhang, Mingqiang Wang, Cong Wang, Zhenpo Wang

    Published 2024-01-01
    “…A Social Temporal Convolutional Long Short-Term Memory network is constructed to capture the interactive characteristics among the host and surrounding vehicles and to predict the statistical distribution of the trajectory prediction uncertainty in the prediction horizon. …”
    Get full text
    Article
  16. 16

    Machine learning for predicting Plasmodium liver stage development in vitro using microscopy imaging by Corin F. Otesteanu, Reto Caldelari, Volker Heussler, Raphael Sznitman

    Published 2024-12-01
    “…This study focuses on the liver stage development of the model organism Plasmodium berghei, employing fluorescent microscopy imaging and convolutional neural networks (CNNs) for analysis. Convolutional neural networks have been recently proposed as a viable option for tasks such as malaria detection, prediction of host-pathogen interactions, or drug discovery. …”
    Get full text
    Article
  17. 17

    A Comparative Analysis of Single and Multi-View Deep Learning for Cybersecurity Anomaly Detection by Min Li, Yuansong Qiao, Brian Lee

    Published 2025-01-01
    “…These findings confirmed the effectiveness of multi-view methods in integrating complementary data in host and enterprise network scenarios based on network environments.…”
    Get full text
    Article
  18. 18

    A Global Perspective on Lunar Granular Flows by V. T. Bickel, S. Loew, J. Aaron, N. Goedhart

    Published 2022-06-01
    “…Here, we build and deploy a convolutional neural network and map 28,101 flow features between 60°N and S by scanning through ∼150,000 Lunar Reconnaissance Orbiter images. …”
    Get full text
    Article
  19. 19

    POTA: A Pipelined Oblivious Transfer Acceleration Architecture for Secure Multi-Party Computation by Li Xiaolin, Yan Wei, Liu Hongwei, Zhang Yong, Hao Qinfen, Liu Yong, Sun Ninghui

    Published 2025-06-01
    “…In addition, to address the performance overhead caused by data transfer between POTA and the host CPU, we design a host-accelerator execution pipeline to hide the considerable transmission latency. …”
    Get full text
    Article
  20. 20

    A Deep Learning Model Leveraging Time-Series System Call Data to Detect Malware Attacks in Virtual Machines by A. Alfred Raja Melvin, Jaspher W. Kathrine, Andrew Jeyabose, D. Cenitta

    Published 2025-03-01
    “…Abstract A Tenant Virtual Machine (TVM) user in the cloud may misuse its computing power to launch malware attack against other tenant VMs, Host OS, Hypervisor, or any other computing devices/resources inside the cloud environment of a Cloud Service Provider. …”
    Get full text
    Article