-
1
Flu-CNN: identifying host specificity of Influenza A virus using convolutional networks
Published 2025-08-01“…To address this, we proposed Flu-level Convolutional Neural Networks (Flu-CNN), a model designed to analyze genomic segments and identify IAV host specificity, with a particular focus on avian influenza viruses that could potentially infect humans. …”
Get full text
Article -
2
Convolutional neural network analysis of optical texture patterns in liquid-crystal skyrmions
Published 2025-03-01“…In addition to well studied singular defects such as point or line disclinations, liquid crystals can also host non-singular solitonic defects such as skyrmions, hopfions, and torons. …”
Get full text
Article -
3
A novel approach for detecting malicious hosts based on RE-GCN in intranet
Published 2024-12-01“…For malicious host detection, this paper proposes the Relational-Edge Graph Convolutional Network (RE-GCN) model, which can directly aggregate and learn features on edges and use them to accurately classify nodes, compared to other GNN models. …”
Get full text
Article -
4
Measurement of Fracture Networks in Rock Sample by X-Ray Tomography, Convolutional Filtering and Deep Learning
Published 2025-07-01“…The neural network segmentation demonstrated superior capability in distinguishing fractures filled with various materials from the host rock, overcoming the limitations observed in traditional convolution-based methods. …”
Get full text
Article -
5
Convolution neural network and 77 GHz millimeter wave radar based intelligent liquid classification system
Published 2023-11-01“…An intelligent liquid classification system based on 77 GHz millimeter wave radar and convolution neural network are proposed in this paper. …”
Get full text
Article -
6
-
7
Vowel classification with combining pitch detection and one‐dimensional convolutional neural network based classifier for gender identification
Published 2023-05-01“…Then, in vowel voice signal classification, a one‐dimensional (1D) convolutional neural network (CNN), consisted of a multi‐round 1D kernel convolutional layer, a 1D pooling process, and a vowel classifier that could preliminary divide feature patterns into three level ranges of F0, including adult and children groups. …”
Get full text
Article -
8
MEMPSEP‐I. Forecasting the Probability of Solar Energetic Particle Event Occurrence Using a Multivariate Ensemble of Convolutional Neural Networks
Published 2024-09-01“…Abstract The Sun continuously affects the interplanetary environment through a host of interconnected and dynamic physical processes. …”
Get full text
Article -
9
A computational framework for processing time-series of earth observation data based on discrete convolution: global-scale historical Landsat cloud-free aggregates at 30 m spatial...
Published 2024-12-01“…To further limit the storage size the produced data was saved as 8-bit Cloud-Optimized GeoTIFFs (COG). With the hosting of about 20 TB per band/index for an entire 30 m resolution bi-monthly historical time-series distributed as open data, the product enables seamless, fast, and affordable access to the Landsat archive for environmental monitoring and analysis applications.…”
Get full text
Article -
10
A Low-Cost AI-Powered System for Early Detection of Diabetic Retinopathy and Ocular Diseases in Resource Limited Settings
Published 2025-01-01“…A user-friendly web application hosted on AWS facilitates seamless image upload, automated diagnosis, and report generation. …”
Get full text
Article -
11
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01“…The DNS requests that transfer stolen information from a host infected by malicious software to an external host controlled by a malefactor are considered. …”
Get full text
Article -
12
New Rotation Periods from the Kepler Bonus Background Light Curves
Published 2025-01-01“…The Kepler field hosts the best-studied sample of field star rotation periods. …”
Get full text
Article -
13
A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Published 2023-01-01“…Machine learning and deep learning techniques are widely used to evaluate intrusion detection systems (IDS) capable of rapidly and automatically recognizing and classifying cyber-attacks on networks and hosts. However, when destructive attacks are becoming more extensive, more challenges develop, needing a comprehensive response. …”
Get full text
Article -
14
HIDS-IoMT: A Deep Learning-Based Intelligent Intrusion Detection System for the Internet of Medical Things
Published 2025-01-01“…The proposed model hybridizes the Convolutional Neural Network (CNN) for feature extraction and the Long Short Term Memory neural network (LSTM) for sequence data prediction. …”
Get full text
Article -
15
An Uncertainty-Aware Lane Change Motion Planning Algorithm Based on Probabilistic Trajectory Prediction Distribution
Published 2024-01-01“…A Social Temporal Convolutional Long Short-Term Memory network is constructed to capture the interactive characteristics among the host and surrounding vehicles and to predict the statistical distribution of the trajectory prediction uncertainty in the prediction horizon. …”
Get full text
Article -
16
Machine learning for predicting Plasmodium liver stage development in vitro using microscopy imaging
Published 2024-12-01“…This study focuses on the liver stage development of the model organism Plasmodium berghei, employing fluorescent microscopy imaging and convolutional neural networks (CNNs) for analysis. Convolutional neural networks have been recently proposed as a viable option for tasks such as malaria detection, prediction of host-pathogen interactions, or drug discovery. …”
Get full text
Article -
17
A Comparative Analysis of Single and Multi-View Deep Learning for Cybersecurity Anomaly Detection
Published 2025-01-01“…These findings confirmed the effectiveness of multi-view methods in integrating complementary data in host and enterprise network scenarios based on network environments.…”
Get full text
Article -
18
A Global Perspective on Lunar Granular Flows
Published 2022-06-01“…Here, we build and deploy a convolutional neural network and map 28,101 flow features between 60°N and S by scanning through ∼150,000 Lunar Reconnaissance Orbiter images. …”
Get full text
Article -
19
POTA: A Pipelined Oblivious Transfer Acceleration Architecture for Secure Multi-Party Computation
Published 2025-06-01“…In addition, to address the performance overhead caused by data transfer between POTA and the host CPU, we design a host-accelerator execution pipeline to hide the considerable transmission latency. …”
Get full text
Article -
20
A Deep Learning Model Leveraging Time-Series System Call Data to Detect Malware Attacks in Virtual Machines
Published 2025-03-01“…Abstract A Tenant Virtual Machine (TVM) user in the cloud may misuse its computing power to launch malware attack against other tenant VMs, Host OS, Hypervisor, or any other computing devices/resources inside the cloud environment of a Cloud Service Provider. …”
Get full text
Article