Showing 521 - 540 results of 590 for search '"Deployment environment', query time: 0.06s Refine Results
  1. 521
  2. 522

    La gestion de l’eau à Bibracte (Saône-et-Loire), avant et après la Conquête romaine by Laetitia Borau

    Published 2020-12-01
    “…In these particular situations it is possible to examine how populations adapted to their environment by developing specific techniques to channel and store water as well as to evaluate the impact of Roman technologies on their social practices. …”
    Get full text
    Article
  3. 523

    Arithmetic-Like Reasoning in Wild Vervet Monkeys: A Demonstration of Cost-Benefit Calculation in Foraging by Sayaka Tsutsumi, Tomokazu Ushitani, Kazuo Fujita

    Published 2011-01-01
    “…Arithmetic-like reasoning has been demonstrated in various animals in captive and seminatural environments, but it is unclear whether such competence is practiced in the wild. …”
    Get full text
    Article
  4. 524

    On the Stability of the Kubernetes Horizontal Autoscaler Control Loop by Berta Serracanta, Andor Lukacs, Alberto Rodriguez-Natal, Albert Cabellos, Gabor Retvari

    Published 2025-01-01
    “…Kubernetes is a widely used platform for deploying and managing containerized applications due to its efficient elastic capabilities. …”
    Get full text
    Article
  5. 525

    Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study by Riccardo Mennilli, Luigi Mazza, Andrea Mura

    Published 2025-01-01
    “…This study investigates the potential of deploying a neural network model on an advanced programmable logic controller (PLC), specifically the Finder Opta™, for real-time inference within the predictive maintenance framework. …”
    Get full text
    Article
  6. 526

    Making It Count: Pilgrimage and the Enumeration of Publics by Simon Coleman

    Published 2025-01-01
    “…Number can be deployed by professional hosts to represent undifferentiated visiting publics in terms of spiritual possibility. …”
    Get full text
    Article
  7. 527

    A Measurement System for the Position and Phase Errors of the Elements in an Antenna Array Subject to Mutual Coupling by Tore Lindgren, Johan Borg

    Published 2012-01-01
    “…When deploying large antenna arrays in arctic environments, a local measurement system may be necessary in order to ensure control over the position and phase of the individual antenna elements. …”
    Get full text
    Article
  8. 528

    Safety monitoring and evacuation guide system for pipeline testing laboratory by indoor positioning technique and distributed sensor network by Lianhong Ding, Yu Xiao, Xiaotong Deng, Feng Li

    Published 2018-06-01
    “…The method and system can improve the safety of chemical laboratory and other environments with potential dangerous.…”
    Get full text
    Article
  9. 529

    Personalization of the Workplace through a Proximity Detection System Using User Profiles by Carolina Zato, Sara Rodríguez, Alejandro Sánchez, Gabriel Villarrubia, Javier Bajo, Juan Manuel Corchado

    Published 2013-08-01
    “…These agents are implemented and deployed within the PANGEA platform so PANGEA conforms the skeleton of the system and allows to develop an integral system. …”
    Get full text
    Article
  10. 530

    Building for speech: designing the next-generation of social robots for audio interaction by Angus Addlesee, Ioannis Papaioannou

    Published 2025-01-01
    “…We suggest practical steps towards future real-world deployments of conversational AI systems for human-robot interaction.…”
    Get full text
    Article
  11. 531

    Cross-chain medical data sharing scheme based on elliptic curve signcryption by YU Huifang, LI Lei

    Published 2024-12-01
    “…Due to high isolation of blockchain from external environments, medical data in inside blockchain of medical institutions can only be shared within institution itself. …”
    Get full text
    Article
  12. 532

    In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes by Amal Hkiri, Mouna Karmani, Fawaz Hasan Alasmary, Omar Ben Bahri, Ahmed Mohammed Murayr, Mohsen Machhout

    Published 2025-02-01
    “…The research scrutinizes these cryptographic solutions within the resource-constrained environments characteristic of IoT and WSN deployments. …”
    Get full text
    Article
  13. 533

    The Prediction Method and Application of Off-Road Mobility for Ground Vehicles: A Review by Chen Hua, Wencheng Zhang, Hanghao Fu, Yuhao Zhang, Biao Yu, Chunmao Jiang, Yuliang Wei, Ziyu Chen, Xinkai Kuang

    Published 2025-01-01
    “…With the rapid advancement of technologies related to unmanned ground systems, ground vehicles are being widely deployed across various domains. However, when operating in complex, soft terrain environments, the low bearing capacity of such terrains poses a significant challenge to vehicle mobility. …”
    Get full text
    Article
  14. 534

    The Memory Efficiency in a Receptionist Robot's Face Recognition System Using LBPH Algorithm by Endang Darmawan Yudi, Yesi Novaria Kunang, Ahmad Zarkasi

    Published 2024-12-01
    “…The results suggest practical benefits for deploying face recognition in resource-constrained environments, enhancing the efficiency of robotic receptionist applications.…”
    Get full text
    Article
  15. 535

    Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT by Kisung Park, Myeonghyun Kim, Youngho Park

    Published 2025-01-01
    “…IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. …”
    Get full text
    Article
  16. 536

    Smart oxygen monitoring in hospitals: a pilot study during COVID-19 by Jan Velicka, Martin Pies, Radovan Hajovsky, Katerina Barnova, Radek Martinek

    Published 2025-01-01
    “…The proposed IoT-based smart monitoring system is a cost-effective and efficient solution for improving safety in medical environments.…”
    Get full text
    Article
  17. 537

    Model pruning techniques in the Internet of things: state of the art, methods and perspectives by ZHAO Junhui, LI Huaicheng, WANG Dongming, LI Jiamin, ZHOU Yiqing, SHU Feng

    Published 2024-12-01
    “…This technique was extremely suitable for optimising AI models deployed on IoT devices. Firstly, two typical model pruning techniques-structured pruning and unstructured pruning, which were currently popular and suitable for different application scenarios, were reviewed. …”
    Get full text
    Article
  18. 538

    Harnessing Meta-Reinforcement Learning for Enhanced Tracking in Geofencing Systems by Alireza Famili, Shihua Sun, Tolga Atalay, Angelos Stavrou

    Published 2025-01-01
    “…Geofencing technologies have become pivotal in creating virtual boundaries for both real and virtual environments, offering a secure means to control and monitor designated areas. …”
    Get full text
    Article
  19. 539

    Lightweight and Efficient CSI-Based Human Activity Recognition via Bayesian Optimization-Guided Architecture Search and Structured Pruning by Sungkwan Youm, Sunghyun Go

    Published 2025-01-01
    “…Motivated by the need for accuracy and efficiency in resource-constrained environments, we combine Bayesian Optimization-based Neural Architecture Search (NAS) with a structured pruning algorithm. …”
    Get full text
    Article
  20. 540

    Adaptive Handover Management in High-Mobility Networks for Smart Cities by Yahya S. Junejo, Faisal K. Shaikh, Bhawani S. Chowdhry, Waleed Ejaz

    Published 2025-01-01
    “…However, challenges persist in ensuring smooth handovers in dense deployments, especially in higher frequency bands and with increased user mobility. …”
    Get full text
    Article