Results 201 to 210 of about 103,799 (334)
High-Efficiency Lossy Source Coding Based on Multi-Layer Perceptron Neural Network. [PDF]
Wang Y +5 more
europepmc +1 more source
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
KeySDL: sparse dictionary learning for keystone microbe identification from steady-state observations using a dynamical-systems model. [PDF]
Gordon M +4 more
europepmc +1 more source
ABSTRACT As a government‐regulated public service, traffic signal control (TSC) requires reliable and transparent decision‐making. However, existing deep reinforcement learning (DRL) methods, despite improvements in control accuracy, still lack explainability and generalisation, severely limiting their applicability in real‐world environments.
Hao Huang +8 more
wiley +1 more source
HASwinNet: A Swin Transformer-Based Denoising Framework with Hybrid Attention for mmWave MIMO Systems. [PDF]
Han X, Tu H, Ying J, Chen J, Xing Z.
europepmc +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
IoT framework for sports activity safety monitoring based on wearable sensors and CRNN spatiotemporal analysis. [PDF]
Zhang SZ, Yang HZ, Gao Y.
europepmc +1 more source
DrLS: Distortion‐Resistant Lossless Steganography via Colour Depth Interpolation
ABSTRACT The lossless data steganography is to hide a certain amount of information into a container image. Previous lossless steganography methods fail to strike a balance between capacity, imperceptibility, accuracy, and robustness, commonly vulnerable to distortion on container images.
Youmin Xu +3 more
wiley +1 more source
Rate-distortion trade-off analysis of the power-domain ISAC waveform for the unmanned aerial vehicle. [PDF]
Li G +9 more
europepmc +1 more source

