|
|
|
Christine Dewi, Danny Manongga, Hendry, Evangs Mailoa and Kristoko Dwi Hartomo
Face mask detection is a technological application that employs computer vision methodologies to ascertain the presence or absence of a face mask on an individual depicted in an image or video. This technology gained significant attention and adoption du...
ver más
|
|
|
|
|
|
|
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb...
ver más
|
|
|
|
|
|
|
Yuntao Shi, Hongfei Zhang, Wei Guo, Meng Zhou, Shuqin Li, Jie Li and Yu Ding
This research proposes a face detection algorithm named LighterFace, which is aimed at enhancing detection speed to meet the demands of real-time community applications. Two pre-trained convolutional neural networks are combined, namely Cross Stage Parti...
ver más
|
|
|
|
|
|
|
Hao An, Ruotong Ma, Yuhan Yan, Tailai Chen, Yuchen Zhao, Pan Li, Jifeng Li, Xinyue Wang, Dongchen Fan and Chunli Lv
This paper aims to address the increasingly severe security threats in financial systems by proposing a novel financial attack detection model, Finsformer. This model integrates the advanced Transformer architecture with the innovative cluster-attention ...
ver más
|
|
|
|
|
|
|
Sepideh Molaei, Stefano Cirillo and Giandomenico Solimando
MicroRNAs (miRNAs) play a crucial role in cancer development, but not all miRNAs are equally significant in cancer detection. Traditional methods face challenges in effectively identifying cancer-associated miRNAs due to data complexity and volume. This ...
ver más
|
|
|
|
|
|
|
Alvaro A. Teran-Quezada, Victor Lopez-Cabrera, Jose Carlos Rangel and Javier E. Sanchez-Galan
Convolutional neural networks (CNN) have provided great advances for the task of sign language recognition (SLR). However, recurrent neural networks (RNN) in the form of long?short-term memory (LSTM) have become a means for providing solutions to problem...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Qasem Abu Al-Haija and Ahmed Al-Tamimi
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia...
ver más
|
|
|
|
|
|
|
Ayman Noor, Ziad Algrafi, Basil Alharbi, Talal H. Noor, Abdullah Alsaeedi, Reyadh Alluhaibi and Majed Alwateer
Ambulance vehicles face a challenging issue in minimizing the response time for an emergency call due to the high volume of traffic and traffic signal delays. Several research works have proposed ambulance vehicle detection approaches and techniques to p...
ver más
|
|
|
|
|
|
|
Yuntao Shi, Qi Luo, Meng Zhou, Wei Guo, Jie Li, Shuqin Li and Yu Ding
Objects thrown from tall buildings in communities are characterized by their small size, inconspicuous features, and high speed. Existing algorithms for detecting such objects face challenges, including excessive parameters, overly complex models that ar...
ver más
|
|
|
|