Results 51 to 60 of about 2,576 (162)
Malaria is one of the most serious public health challenges that requires effective diagnostic methodologies in aid of its management and control. The work herein proposes a hybrid deep learning model that merges GANs with LSTMs to classify malaria parasites through imaging.
Boluwatife Elizabeth Ogundiran +4 more
wiley +1 more source
Darknet – selected criminological, forensic and legal aspects of encrypted computer networks
The article raises issues concerning encrypted networks, their content and security. The following terms are explained: Darknet, Deep Web and Dark Web. The article presents some technical aspects of The Onion Router software and its origins.
Hubert Wojciechowski
doaj +1 more source
Shield tunnels are crucial for urban transit systems, yet they are susceptible to defects like cracks and leaks that compromise structural integrity and safety. Traditional inspection methods are inefficient and subjective. This paper provides a comprehensive review of deep learning–based intelligent detection methods for shield tunnel lining defects ...
Decai Wang +8 more
wiley +1 more source
Recognition of Different Types of Leukocytes Using YOLOv2 and Optimized Bag-of-Features
White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task.
Muhammad Sharif +6 more
doaj +1 more source
Multiclass objects detection algorithm using DarkNet-53 and DenseNet for intelligent vehicles
Intelligent vehicles should not only be able to detect various obstacles, but also identify their categories so as to take an appropriate protection and intervention.
Lina Yang, Gang Chen, Wenyan Ci
doaj +1 more source
Deep mining port scans from darknet [PDF]
SummaryTCP/UDP port scanning or sweeping is one of the most common technique used by attackers to discover accessible and potentially vulnerable hosts and applications. Although extracting and distinguishing different port scanning strategies is a challenging task, the identification of dependencies among probed ports is primordial for profiling ...
Lagraa, Sofiane +2 more
openaire +2 more sources
To address the requirements for high‐precision detection of transmission line defects by inspection drones in low‐light environments such as cloudy days and to overcome the problem of significant accuracy degradation in current defect detection algorithms under low‐light conditions, this paper uses YOLOv8 as the baseline algorithm.
Yuxin Zhu +2 more
wiley +1 more source
U radu se analiziraju izazovi koje anonimnost korisnika interneta, pre svega TOR mreže i darkneta, postavlja pred krivičnopravnu teoriju i praksu. Centralni deo rada odnosi se na studiju slučaja Playpen, odnosno na pravne i etičke dileme koje su se ...
Irena R. Čučilović
doaj +1 more source
UAV-YOLO: Small Object Detection on Unmanned Aerial Vehicle Perspective
Object detection, as a fundamental task in computer vision, has been developed enormously, but is still challenging work, especially for Unmanned Aerial Vehicle (UAV) perspective due to small scale of the target.
Mingjie Liu +5 more
doaj +1 more source
LA‐YOLO: Location Refinement and Adjacent Feature Fusion‐Based Infrared Small Target Detection
ABSTRACT In the field of infrared small target detection (ISTD), the ability to detect targets in dim environments is critical, as it improves the performance of target recognition in nighttime and harsh weather conditions. The blurry contour, small size and sparse distribution of infrared small targets increase the difficulty of identifying such ...
Shijie Liu +9 more
wiley +1 more source

