Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–2 dari 2 artikel
EDANet: A Novel Architecture Combining Depthwise Separable Convolutions and Hybrid Attention for Efficient Tomato Disease Recognition
Ibrahim, Yusuf
; O. Momoh, Muyideen
; O. Shobowale, Kafayat
; Mukhtar Abubakar, Zainab
; Yahaya, Basira
Journal of Computing Theories and Applications
Vol 3
, No 2
(2025)
Tomato crop yields face significant threats from plant diseases, with existing deep learning solutions often computationally prohibitive for resource-constrained agricultural settings; to address this gap, we propose Efficient Disease Attention Network (EDANet), a novel lightweight architecture combining depthwise separable convolutions with hybrid attention mechanisms for efficient Tomato disease recognition. Our approach integrates channel and spatial attention within hierarchical blocks to pr...
Sumber Asli
Google Scholar
DOI
Formulating Tracing and Linking Algorithm For Identifying Cyber Terrorism Website
Wan Ahmad Ramzi W.Y
; Aznizah Ab.Karim
; Mohamad Shaufi Kambaruddin
; Afzanizam Alias
; Mohd Faizal Yahaya
International Journal of Mechanical, Electrical and Civil Engineering
Vol 2
, No 2
(2025)
Nowadays, the number of cyber terrorists that using Internet as a medium keep increasing around the world are really worrying. Even though the cyber terrorist is publishing their post openly and public, there are quite difficult to recognize their main communication media. This happen because the cyber terrorist might hide their agenda through any sympathetic base website. Therefore, the aim of this project is to formulate tracing and linking algorithm using data mining technique in order to ide...
Sumber Asli
Google Scholar
DOI