Results 1 to 10 of about 11,194,457 (361)
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) [PDF]
Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in computer network security, such as fraud detection, network anomaly detection, intrusion detection, and much more.
Khushnaseeb Roshan, Aasim Zafar
semanticscholar +1 more source
Computation in Complex Networks [PDF]
The Special Issue on “Computation in Complex Networks” focused on gathering highly original papers in the field of current complex network research [...]
Pizzuti C, Socievole A
openaire +5 more sources
Construction of Computer Network Security System in the Era of Big Data
Computer network security is one of the important factors affecting the development of computer technology. Analyzing and exploring computer network security in the era of big data is conducive to achieving effective protection of data information.
Y. Lin
semanticscholar +1 more source
Development of Augmented Reality Application for Learning Computer Network Device
Applied augmented reality works by detecting imageries or pictures, normally called markers, by using smartphone camera that detects these preplaced markers. Augmented reality has seen wide application in various fields, one of them is education.
M. L. Hamzah +5 more
semanticscholar +1 more source
Application of Data Encryption Technology in Computer Network Information Security
In order to solve the partial optimization problems of the RSA algorithm in computer network security, a method of RSA algorithm optimization based on data encryption was proposed.
Lifeng Li
semanticscholar +1 more source
In this paper, a class of multi-group SEIQR models with random perturbation in computer network is investigated. The existence and uniqueness of global positive solution with any positive initial value are obtained.
Ramziya Rifhat +4 more
doaj +1 more source
COMPUTER SIMULATION MODEL OF A COMPUTER NETWORK WITH FRACTAL TRAFFIC FOR TESTING ROUTING ALGORITHMS
The object of research in this article is simulation modeling of a computer network and the process of traffic routing. The relevance of the research is due to the importance of ensuring the quality of service in computer networks, in particular ...
Hanna Drieieva +3 more
doaj +1 more source
LateX, 77 pages,23 figures; to appear in Annals of ...
MARZUOLI, ANNALISA, Rasetti Mario
openaire +3 more sources
EEGNet: a compact convolutional neural network for EEG-based brain–computer interfaces [PDF]
Objective. Brain–computer interfaces (BCI) enable direct communication with a computer, using neural activity as the control signal. This neural signal is generally chosen from a variety of well-studied electroencephalogram (EEG) signals. For a given BCI
Vernon J. Lawhern +5 more
semanticscholar +1 more source
DeepCAD: A Deep Generative Network for Computer-Aided Design Models [PDF]
Deep generative models of 3D shapes have received a great deal of research interest. Yet, almost all of them generate discrete shape representations, such as voxels, point clouds, and polygon meshes.
Rundi Wu, Chang Xiao, Changxi Zheng
semanticscholar +1 more source

