Results 71 to 80 of about 2,576 (162)

Darknet Traffic Analysis: A Systematic Literature Review

open access: yesIEEE Access
The primary objective of an anonymity tool is to protect the anonymity of its users through the implementation of strong encryption and obfuscation techniques.
Javeriah Saleem   +2 more
doaj   +1 more source

Automatic Damage Detection of Pavement through DarkNet Analysis of Digital, Infrared, and Multi-Spectral Dynamic Imaging Images

open access: yesSensors
It is important to maintain the safety of road driving by automatically performing a series of processes to automatically measure and repair damage to the road pavement.
Hyungjoon Seo, Yunfan Shi, Lang Fu
doaj   +1 more source

Deep Learning-Based Noninvasive Blood Glucose Estimation

open access: yesJournal of Engineering
Estimating blood glucose levels (BGLs) noninvasively is a rapidly advancing field driven by the need for effective and painless glucose monitoring solutions for diabetic patients.
Shatha M. Ali   +2 more
doaj   +1 more source

Improved CNN architecture for automated classification of skin diseases

open access: yesComputer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization
Rosacea, atopic dermatitis and bullous disease are significant skin conditions with distinct characteristics and impacts, which affect millions of people globally.
G. Divya Deepak   +2 more
doaj   +1 more source

The darknet’s anonymity dilemma

open access: yes, 2018
The darknet is not just a place for criminalised activities; it facilitates anonymous communication between all those adopting marginalised positions, including human rights activists, dissidents and whistleblowers. They show that our society must face the dilemma between freedom and control. My article seeks to do two things.
Tzanetakis, Meropi, University Of Vienna
openaire   +1 more source

Decoding the shadows: multi-modal identity profiling in darknet markets using latent behavior feature fusion

open access: yesDiscover Applied Sciences
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang   +6 more
doaj   +1 more source

Hate online: Anti-immigration rhetoric in Darknet

open access: yesNordia Geographical Publications, 2017
The worsening conditions in the Middle-East and Sub-Saharan Africa have resulted in millions of asylum seekers entering the European Union. Also, Finland received over ten times more asylum seekers in 2015 than the previous years.
Eva Kaján
doaj  

Localization of human percentages on X-ray images with use of Darknet YOLO

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
Technology that allows to localize vertebrae on X-ray images and then determine geometric parameters using the OpenCV computer vision library using a convolutional neural network Darknet YOLO based on regions is proposed.
K. S. Kurachka   +2 more
doaj  

Network Traffic Classification from Signal-Level Representations of Ethernet Frames Using Transfer Learning

open access: yesAdvances in Electrical and Computer Engineering
Classifying network traffic is a fundamental task in network management, security, and quality of service provisioning. Traditional approaches usually depend on packet-level content or flow-level statistical features.
GEYLANI, M., CIBUK, M., AKBAL, A.
doaj   +1 more source

Home - About - Disclaimer - Privacy