|
|
|
Edwin Peralta-Garcia, Juan Quevedo-Monsalbe, Victor Tuesta-Monteza and Juan Arcila-Diaz
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservi...
ver más
|
|
|
|
|
|
|
Qishun Mei and Xuhui Li
To address the limitations of existing methods of short-text entity disambiguation, specifically in terms of their insufficient feature extraction and reliance on massive training samples, we propose an entity disambiguation model called COLBERT, which f...
ver más
|
|
|
|
|
|
|
Mohammad Alhumaid and Ayman G. Fayoumi
Paranasal sinus pathologies, particularly those affecting the maxillary sinuses, pose significant challenges in diagnosis and treatment due to the complex anatomical structures and diverse disease manifestations. The aim of this study is to investigate t...
ver más
|
|
|
|
|
|
|
Yuhuan Wu and Yonghong Wu
Salient object detection (SOD) aims to identify the most visually striking objects in a scene, simulating the function of the biological visual attention system. The attention mechanism in deep learning is commonly used as an enhancement strategy which e...
ver más
|
|
|
|
|
|
|
Qasem Abu Al-Haija and Ahmed Al-Tamimi
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia...
ver más
|
|
|
|
|
|
|
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual...
ver más
|
|
|
|
|
|
|
Gulshan Saleem, Usama Ijaz Bajwa, Rana Hammad Raza and Fan Zhang
Surveillance video analytics encounters unprecedented challenges in 5G and IoT environments, including complex intra-class variations, short-term and long-term temporal dynamics, and variable video quality. This study introduces Edge-Enhanced TempoFuseNe...
ver más
|
|
|
|
|
|
|
Feng Zhou, Shijing Hu, Xin Du, Xiaoli Wan and Jie Wu
In the current field of disease risk prediction research, there are many methods of using servers for centralized computing to train and infer prediction models. However, this centralized computing method increases storage space, the load on network band...
ver más
|
|
|
|
|
|
|
Bochen Duan, Shengping Wang, Changlong Luo and Zhigao Chen
In recent years, the surge in marine activities has increased the frequency of submarine pipeline failures. Detecting and identifying the buried conditions of submarine pipelines has become critical. Sub-bottom profilers (SBPs) are widely employed for pi...
ver más
|
|
|
|
|
|
|
Jun Tie, Weibo Wu, Lu Zheng, Lifeng Wu and Ting Chen
When aiming at the problems such as missed detection or misdetection of recognizing green walnuts in the natural environment directly by using target detection algorithms, a method is proposed based on improved UNet3+ for green walnut image segmentation,...
ver más
|
|
|
|