Results 21 to 30 of about 699,176 (299)

Short term synaptic depression improves information transfer in perceptual multistability [PDF]

open access: yes, 2012
Competitive neural networks are often used to model the dynamics of perceptual bistability. Switching between percepts can occur through fluctuations and/or a slow adaptive process. Here, we analyze switching statistics in competitive networks with short
Kilpatrick, Zachary P
core   +3 more sources

KRDroid: Ransomware-Oriented Detector for Mobile Devices Based on Behaviors

open access: yesApplied Sciences, 2021
Ransomware has become a serious threat on Android and new cases of ransomware are continuously growing. Most existing ransomware detectors use sensitive text or APIs to detect ransomware.
Senmiao Wang   +6 more
doaj   +1 more source

A Lower Bound Technique for Communication in BSP [PDF]

open access: yes, 2017
Communication is a major factor determining the performance of algorithms on current computing systems; it is therefore valuable to provide tight lower bounds on the communication complexity of computations.
Bilardi, Gianfranco   +2 more
core   +2 more sources

Webshell Traffic Detection With Character-Level Features Based on Deep Learning

open access: yesIEEE Access, 2018
Webshell is a kind of backdoor programs based on Web services. Network-based detection could monitor the request and response traffic to find abnormal behaviors and detect the existence of Webshell.
Hua Zhang   +6 more
doaj   +1 more source

Vulnerability Detection on Android Apps–Inspired by Case Study on Vulnerability Related With Web Functions

open access: yesIEEE Access, 2020
Nowadays, people's lifestyle is more and more dependent on mobile applications (Apps), such as shopping, financial management and surfing the internet. However, developers mainly focus on the implementation of Apps and the improvement of user experience ...
Jiawei Qin   +5 more
doaj   +1 more source

Development of Novel Network Architectures

open access: yes中国工程科学, 2022
The communication industry is crucial for promoting a country's network strength, leading scientific and technological innovation, and driving economic and social transformation.
Ouyang Man   +3 more
doaj   +1 more source

Three-dimensional aerial base station location for sudden traffic with deep reinforcement learning in 5G mmWave networks

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Data volume demand has increased dramatically due to huge user device increasement along with the development of cellular networks. And macrocell in 5G networks may encounter sudden traffic due to dense users caused by sports or celebration activities ...
Peng Yu   +5 more
doaj   +1 more source

Energy savings using an adaptive base station-to-relay station switching paradigm [PDF]

open access: yes, 2012
Applying a Base Station (BS) sleep approach during low traffic periods has recently been advocated as a strategy for reducing energy consumption in cellular networks. The complete switching off of certain BS however, can lead to coverage holes and severe
Alam, Atm Shafiul   +3 more
core   +1 more source

An Adaptive Sticky Hidden Markov Model for Robust State Inference in Non-Stationary Physiological Time Series

open access: yesMathematics
The accurate inference of hidden states from non-stationary physiological signals remains a significant challenge in stochastic process modeling. This paper proposes an Adaptive Sticky Hidden Markov Model (Sticky-HMM) framework designed to enhance the ...
Qizheng Wang   +4 more
doaj   +1 more source

The Optical Signal-to-Crosstalk Ratio for the MBA(N, e, g) Switching Fabric

open access: yesSensors, 2021
The banyan-type switching networks, well known in switching theory and called the logdN switching fabrics, are composed of symmetrical switching elements of size d×d.
Remigiusz Rajewski
doaj   +1 more source

Home - About - Disclaimer - Privacy