Zobrazeno 1 - 10
of 4 289
pro vyhledávání: '"Senet P"'
Brain tumors are abnormalities that can severely impact a patient's health, leading to life-threatening conditions such as cancer. These can result in various debilitating effects, including neurological issues, cognitive impairment, motor and sensor
Externí odkaz:
http://arxiv.org/abs/2409.00804
The automatic speaker verification system is sometimes vulnerable to various spoofing attacks. The 2-class Gaussian Mixture Model classifier for genuine and spoofed speech is usually used as the baseline for spoofing detection. However, the GMM class
Externí odkaz:
http://arxiv.org/abs/2407.05605
Accurate segmentation of COVID-19 CT images is crucial for reducing the severity and mortality rates associated with COVID-19 infections. In response to blurred boundaries and high variability characteristic of lesion areas in COVID-19 CT images, we
Externí odkaz:
http://arxiv.org/abs/2403.01513
Social engineering (SE) aims at deceiving users into performing actions that may compromise their security and privacy. These threats exploit weaknesses in human's decision making processes by using tactics such as pretext, baiting, impersonation, et
Externí odkaz:
http://arxiv.org/abs/2401.05569
Publikováno v:
BMC Musculoskeletal Disorders, Vol 25, Iss 1, Pp 1-11 (2024)
Abstract Background Ankle fractures are prevalent injuries that necessitate precise diagnostic tools. Traditional diagnostic methods have limitations that can be addressed using machine learning techniques, with the potential to improve accuracy and
Externí odkaz:
https://doaj.org/article/4a1f290403924586998b708f302c7e23
Speech Emotion Recognition (SER) has become a growing focus of research in human-computer interaction. Spatiotemporal features play a crucial role in SER, yet current research lacks comprehensive spatiotemporal feature learning. This paper focuses on
Externí odkaz:
http://arxiv.org/abs/2312.11974
Publikováno v:
Jisuanji kexue yu tansuo, Vol 18, Iss 3, Pp 805-817 (2024)
Protocol recognition technology assumes a crucial position and exerts significant influence in the domains of network communication and information security. Existing protocol recognition methods based on spatio-temporal features cannot adequately an
Externí odkaz:
https://doaj.org/article/09c1fbbbf3d8495687ec83a3a600b6ed
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 12, Pp 160052-160063 (2024)
In recent years, convolutional neural network (CNN) has achieved great success in the field of network security protection. With the popularization of smart terminals and the gradual increase of power grid informatization and digitization, the protec
Externí odkaz:
https://doaj.org/article/f03b06ccd8184fb3ad411a5287c2aeff
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.