|
|
|
Feng Zhou, Shijing Hu, Xin Du, Xiaoli Wan and Jie Wu
In the current field of disease risk prediction research, there are many methods of using servers for centralized computing to train and infer prediction models. However, this centralized computing method increases storage space, the load on network band...
ver más
|
|
|
|
|
|
|
Rujia Li, Yadong Li, Weibo Qin, Arzlan Abbas, Shuang Li, Rongbiao Ji, Yehui Wu, Yiting He and Jianping Yang
This research tackles the intricate challenges of detecting densely distributed maize leaf diseases and the constraints inherent in YOLO-based detection algorithms. It introduces the GhostNet_Triplet_YOLOv8s algorithm, enhancing YOLO v8s by integrating t...
ver más
|
|
|
|
|
|
|
Min Hu, Fan Zhang and Huiming Wu
Various abnormal scenarios might occur during the shield tunneling process, which have an impact on construction efficiency and safety. Existing research on shield tunneling construction anomaly detection typically designs models based on the characteris...
ver más
|
|
|
|
|
|
|
Shuo Zhang, Emma Robinson and Malabika Basu
The operation and maintenance (O&M) issues of offshore wind turbines (WTs) are more challenging because of the harsh operational environment and hard accessibility. As sudden component failures within WTs bring about durable downtimes and significant...
ver más
|
|
|
|
|
|
|
Miranda Occhionero, Lorenzo Tonetti, Sara Giovagnoli and Vincenzo Natale
The first years of life are characterized by an absence or paucity of memories, a condition known as infantile amnesia (IA). This study examines the distribution of the early memory recall of young adults, considering the distinction between the first (0...
ver más
|
|
|
|
|
|
|
Chenbo Shi, Yanhong Cheng, Chun Zhang, Jin Yuan, Yuxin Wang, Xin Jiang and Changsheng Zhu
The detection of poultry egg microcracks based on electrical characteristic models is a new and effective method. However, due to the disorder, mutation, nonlinear, time discontinuity, and other factors of the current data, detection algorithms such as s...
ver más
|
|
|
|
|
|
|
Fawaz Khaled Alarfaj and Jawad Abbas Khan
The online spread of fake news on various platforms has emerged as a significant concern, posing threats to public opinion, political stability, and the dissemination of reliable information. Researchers have turned to advanced technologies, including ma...
ver más
|
|
|
|
|
|
|
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,...
ver más
|
|
|
|
|
|
|
Amthal K. Mousa and Mohammed Najm Abdullah
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent...
ver más
|
|
|
|
|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|