Mobile QR Code QR CODE

2024

Acceptance Ratio

21%

References

1 
Qi J. , Cui Q. , Zhang L. , 2023, Solution structures of an electrical transmission line model with bifurcation and chaos in Hamiltonian dynamics, International Journal of Bifurcation and Chaos, Vol. 33, No. 9, pp. 65-78DOI
2 
Hibi S. , Kawabe K. , Masuta T. , 2023, Estimation method for transmission line overloads due to renewable energy source output forecast errors in daily supply and demand planning, IEEJ Transactions on Electrical and Electronic Engineering, Vol. 18, No. 9, pp. 12-24DOI
3 
Ahmed A. , Garg J. , Charate R. , 2022, Are mobile cardiac outpatient monitors reliable to monitor QTc in comparison to 12-lead ECG, Circulation, Vol. 146, No. 1, pp. 140-148Google Search
4 
Chao C. , Mei X. , Wei Y. , 2023, A balanced walking-clamp mechanism for inspection robot of transmission line, Industrial Robot, Vol. 8, No. 4, pp. 50-62DOI
5 
Liu C. , Wu Y. , Liu J. , 2021, Improved YOLOv3 network for insulator detection in aerial images with diverse background interference, Electronics, Vol. 10, No. 7, pp. 771-798DOI
6 
Sunduijav C. , Hardt W. , Bayasgalan Z. , 2021, Image processing of insulator and vibration damper by YOLO algorithm, Proceedings of the XV International Scientific-Technical Conference on Actual Problems of Electronic Instrument Engineering, pp. 375-379Google Search
7 
Li Y. , Zheng P. , Yu M. , 2024, Small-modulus worms surface defect detection method based on YOLOv7, Measurement Science and Technology, Vol. 8, No. 5, pp. 35-43DOI
8 
Yuan B. , Li J. , Liu Z. , 2021, Research on classroom lighting energy saving system based on YOLOv3, Journal of Physics: Conference Series, Vol. 18, No. 1, pp. 12-27DOI
9 
Nagarajan G. , Sushmitha G. V. , Susmitha R. , 2022, Design of an enterprise cloud-based intrusion detection system model using back propagation network based on particle swarm optimisation algorithm, International Journal of Enterprise Network Management, Vol. 6, No. 1, pp. 13-21DOI
10 
Kumar M. D. , Nagalakshmi T. J. , 2023, Design of intrusion detection system for wireless ad hoc network in the detection of DoS attack using one-class SVM with wrapper approach feature selection comparing with information gain algorithm, Proceedings of the International Conference on Advances in Computing, Communication and Applied Informatics, pp. 1-6Google Search
11 
Sadeghizadeh M. , 2022, A lightweight intrusion detection system based on RSSI for sybil attack detection in wireless sensor networks, International Journal of Nonlinear Analysis and Applications, Vol. 13, No. 9, pp. 305-320Google Search
12 
Sirisha A. , Chaitanya K. , Krishna K. V. S. S. R. , 2021, Intrusion detection models using supervised and unsupervised algorithms: a comparative estimation, International Journal of Safety and Security Engineering, Vol. 11, No. 1, pp. 51-58DOI
13 
Aljanabi M. , Ismail M. , 2021, Improved intrusion detection algorithm based on TLBO and GA algorithms, International Arab Journal of Information Technology, Vol. 18, No. 2, pp. 170-179DOI
14 
Al-Gethami K. M. , Al-Akhras M. T. , Alawairdhi M. , 2021, Empirical evaluation of noise influence on supervised machine learning algorithms using intrusion detection datasets, Security and Communication Networks, Vol. 7, No. 5, pp. 1-28DOI
15 
Xu W. , Cui C. , Ji Y. , 2024, YOLOv8-MPEB small target detection algorithm based on UAV images, Heliyon, Vol. 10, No. 8, pp. 29-38DOI
16 
Zhou Y. , Zhu W. , He Y. , 2023, YOLOv8-based spatial target part recognition, Proceedings of the IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, pp. 1684-1687Google Search
17 
Mokayed H. , Quan T. Z. , Alkhaled L. , Sivakumar V. , 2023, Real-time human detection and counting system using deep learning computer vision techniques, Artificial Intelligence and Applications, Vol. 1, No. 4, pp. 221-229Google Search
18 
Manibharathi D. , Vasanthanayaki C. , 2023, Integration of deep direction distribution feature extraction and optimized attention based double hidden layer GRNN models for robust cursive handwriting recognition, International Journal of Pattern Recognition and Artificial Intelligence, Vol. 17, No. 8, pp. 37-43DOI