73   Artículos

 
en línea
Changhong Liu, Jiawen Wen, Jinshan Huang, Weiren Lin, Bochun Wu, Ning Xie and Tao Zou    
Underwater object detection is crucial in marine exploration, presenting a challenging problem in computer vision due to factors like light attenuation, scattering, and background interference. Existing underwater object detection models face challenges ... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Tong Liu, Hanlin Sheng, Zhaosheng Jin, Li Ding, Qian Chen, Rui Huang, Shengyi Liu, Jiacheng Li and Bingxiong Yin    
This paper presents an effective method for measuring oil debris with high confidence to ensure the wear monitoring of aero-engines, which suffers from severe noise interference, weak signal characteristics, and false detection. First, an improved variat... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Jing Chen, Gang Zhou, Jicang Lu, Shiyu Wang and Shunhang Li    
Fake news detection has become a significant topic based on the fast-spreading and detrimental effects of such news. Many methods based on deep neural networks learn clues from claim content and message propagation structure or temporal information, whic... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Norah Abanmi, Heba Kurdi and Mai Alzamel    
The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The ma... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qiwen Tian and Sumiko Miyata    
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a cer... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam    
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Afnan Alotaibi and Murad A. Rassam    
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rowa Aljondi, Salem Saeed Alghamdi, Abdulrahman Tajaldeen, Shareefah Alassiri, Monagi H. Alkinani and Thomas Bertinotti    
Background: Breast cancer has a 14.8% incidence rate and an 8.5% fatality rate in Saudi Arabia. Mammography is useful for the early detection of breast cancer. Researchers have been developing artificial intelligence (AI) algorithms for early breast canc... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xulong Yu, Qiancheng Yu, Qunyue Mu, Zhiyong Hu and Jincai Xie    
Traditional manual visual detection methods are inefficient, subjective, and costly, making them prone to false and missed detections. Deep-learning-based defect detection identifies the types of defects and pinpoints their locations. By employing this a... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hao Sun, Yuejin Du and Qi Li    
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »