-
521
-
522
La gestion de l’eau à Bibracte (Saône-et-Loire), avant et après la Conquête romaine
Published 2020-12-01“…In these particular situations it is possible to examine how populations adapted to their environment by developing specific techniques to channel and store water as well as to evaluate the impact of Roman technologies on their social practices. …”
Get full text
Article -
523
Arithmetic-Like Reasoning in Wild Vervet Monkeys: A Demonstration of Cost-Benefit Calculation in Foraging
Published 2011-01-01“…Arithmetic-like reasoning has been demonstrated in various animals in captive and seminatural environments, but it is unclear whether such competence is practiced in the wild. …”
Get full text
Article -
524
On the Stability of the Kubernetes Horizontal Autoscaler Control Loop
Published 2025-01-01“…Kubernetes is a widely used platform for deploying and managing containerized applications due to its efficient elastic capabilities. …”
Get full text
Article -
525
Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study
Published 2025-01-01“…This study investigates the potential of deploying a neural network model on an advanced programmable logic controller (PLC), specifically the Finder Opta™, for real-time inference within the predictive maintenance framework. …”
Get full text
Article -
526
Making It Count: Pilgrimage and the Enumeration of Publics
Published 2025-01-01“…Number can be deployed by professional hosts to represent undifferentiated visiting publics in terms of spiritual possibility. …”
Get full text
Article -
527
A Measurement System for the Position and Phase Errors of the Elements in an Antenna Array Subject to Mutual Coupling
Published 2012-01-01“…When deploying large antenna arrays in arctic environments, a local measurement system may be necessary in order to ensure control over the position and phase of the individual antenna elements. …”
Get full text
Article -
528
Safety monitoring and evacuation guide system for pipeline testing laboratory by indoor positioning technique and distributed sensor network
Published 2018-06-01“…The method and system can improve the safety of chemical laboratory and other environments with potential dangerous.…”
Get full text
Article -
529
Personalization of the Workplace through a Proximity Detection System Using User Profiles
Published 2013-08-01“…These agents are implemented and deployed within the PANGEA platform so PANGEA conforms the skeleton of the system and allows to develop an integral system. …”
Get full text
Article -
530
Building for speech: designing the next-generation of social robots for audio interaction
Published 2025-01-01“…We suggest practical steps towards future real-world deployments of conversational AI systems for human-robot interaction.…”
Get full text
Article -
531
Cross-chain medical data sharing scheme based on elliptic curve signcryption
Published 2024-12-01“…Due to high isolation of blockchain from external environments, medical data in inside blockchain of medical institutions can only be shared within institution itself. …”
Get full text
Article -
532
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01“…The research scrutinizes these cryptographic solutions within the resource-constrained environments characteristic of IoT and WSN deployments. …”
Get full text
Article -
533
The Prediction Method and Application of Off-Road Mobility for Ground Vehicles: A Review
Published 2025-01-01“…With the rapid advancement of technologies related to unmanned ground systems, ground vehicles are being widely deployed across various domains. However, when operating in complex, soft terrain environments, the low bearing capacity of such terrains poses a significant challenge to vehicle mobility. …”
Get full text
Article -
534
The Memory Efficiency in a Receptionist Robot's Face Recognition System Using LBPH Algorithm
Published 2024-12-01“…The results suggest practical benefits for deploying face recognition in resource-constrained environments, enhancing the efficiency of robotic receptionist applications.…”
Get full text
Article -
535
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01“…IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. …”
Get full text
Article -
536
Smart oxygen monitoring in hospitals: a pilot study during COVID-19
Published 2025-01-01“…The proposed IoT-based smart monitoring system is a cost-effective and efficient solution for improving safety in medical environments.…”
Get full text
Article -
537
Model pruning techniques in the Internet of things: state of the art, methods and perspectives
Published 2024-12-01“…This technique was extremely suitable for optimising AI models deployed on IoT devices. Firstly, two typical model pruning techniques-structured pruning and unstructured pruning, which were currently popular and suitable for different application scenarios, were reviewed. …”
Get full text
Article -
538
Harnessing Meta-Reinforcement Learning for Enhanced Tracking in Geofencing Systems
Published 2025-01-01“…Geofencing technologies have become pivotal in creating virtual boundaries for both real and virtual environments, offering a secure means to control and monitor designated areas. …”
Get full text
Article -
539
Lightweight and Efficient CSI-Based Human Activity Recognition via Bayesian Optimization-Guided Architecture Search and Structured Pruning
Published 2025-01-01“…Motivated by the need for accuracy and efficiency in resource-constrained environments, we combine Bayesian Optimization-based Neural Architecture Search (NAS) with a structured pruning algorithm. …”
Get full text
Article -
540
Adaptive Handover Management in High-Mobility Networks for Smart Cities
Published 2025-01-01“…However, challenges persist in ensuring smooth handovers in dense deployments, especially in higher frequency bands and with increased user mobility. …”
Get full text
Article