Results 21 to 30 of about 25,989,787 (296)

Neighborhood Adaptive Graph Convolutional Network for Node Classification

open access: yesIEEE Access, 2019
Recently, graph convolutional neural network as an efficient and effective method has experienced significant attention and becomes the de facto method for learning node or graph representations.
Peiliang Gong, Lihua Ai
doaj   +1 more source

An Efficient Approach for Detecting and Classifying Moving Vehicles in a Video Based Monitoring System [PDF]

open access: yesEngineering and Technology Journal, 2020
Moving objects detection, type recognition, and traffic analysis in video-based surveillance systems is an active area of research which has many applications in road traffic monitoring.
Sajidah Mahmood, Laith Saud
doaj   +1 more source

Encrypted DNS -> Privacy? A Traffic Analysis Perspective [PDF]

open access: yesNetwork and Distributed System Security Symposium, 2019
Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship.
Sandra Siby   +4 more
semanticscholar   +1 more source

Injury risk functions for the four primary knee ligaments

open access: yesFrontiers in Bioengineering and Biotechnology, 2023
The purpose of this study was to develop injury risk functions (IRFs) for the anterior and posterior cruciate ligaments (ACL and PCL, respectively) and the medial and lateral collateral ligaments (MCL and LCL, respectively) in the knee joint.
Jiota Nusia   +5 more
doaj   +1 more source

Heterogeneous network propagation for herb target identification

open access: yesBMC Medical Informatics and Decision Making, 2018
Background Identifying targets of herbs is a primary step for investigating pharmacological mechanisms of herbal drugs in Traditional Chinese medicine (TCM).
Kuo Yang   +6 more
doaj   +1 more source

IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge

open access: yesIEEE Transactions on Network and Service Management, 2020
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network ...
I. Hafeez   +3 more
semanticscholar   +1 more source

Web-Based Toolkit for Performance Simulation and Analysis of Power Line Communication Networks

open access: yesEnergies, 2021
AMIs (Advanced Metering Infrastructures) present an important role in Smart City environments, especially from the point of view of distribution and customers, offering control and monitoring capabilities.
Mario Sanz   +4 more
doaj   +1 more source

Individual Travel Knowledge Graph-Based Public Transport Commuter Identification: A Mixed Data Learning Approach

open access: yesJournal of Advanced Transportation, 2022
Commuters are the stable travel group for the public transportation (PT) service system. Accurately identifying the PT commuters is conducive to promoting PT service quality and development of urban sustainable transportation.
Song Hu   +4 more
doaj   +1 more source

Machine Learning for Traffic Analysis: A Review

open access: yesANT/EDI40, 2020
Traffic analysis has many purposes such as evaluating the performance and security of network operations and management. Therefore, network traffic analysis is considered vital for improving networks operation and security. This paper discusses different
Nour Alqudah, Qussai M. Yaseen
semanticscholar   +1 more source

A coarse to fine network for fast and accurate object detection in high‐resolution images

open access: yesIET Computer Vision, 2021
Because of the popularisation of high‐resolution images, detecting objects in these images quickly and accurately has attracted increasing attention in recent studies.
Yaguang Guo, Qi Zou, Lu Jin
doaj   +1 more source

Home - About - Disclaimer - Privacy