-
61
Image-based anomaly detection in low-light industrial environments with feature enhancement
Published 2025-03-01“…However, these tasks become significantly more challenging in low-light environments, where poor illumination introduces noise and reduces visibility, leading to degraded performance of traditional methods. …”
Get full text
Article -
62
Large-scale resource state monitoring strategy in network function virtualization environment
Published 2019-12-01Get full text
Article -
63
SSVEP Enhancement in Mixed Reality Environment for Brain–Computer Interfaces
Published 2025-01-01“…The purpose of this study was to optimize stimulus colors in order to improve the MR-BCI system’s performance. In the MR environment, a 10-command SSVEP-BCI was deployed. Various stimulus colors and background colors for the BCI system were tested and optimized in offline and online experiments. …”
Get full text
Article -
64
Multi-UAV Task Assignment in Dynamic Environments: Current Trends and Future Directions
Published 2025-01-01“…However, as UAV missions become more complex and operate in dynamic environments, the task assignment problem becomes increasingly challenging. …”
Get full text
Article -
65
-
66
OPTIMIZATION FOR THE COVERAGE PROBLEM OF WIRELESS SENSOR NETWORK WITH VORONOI ALGORITHM IN 3D ENVIRONMENTS
Published 2016-06-01“…In this paper we extend Voronoi algorithm to deploy sensors in 3D environments where there are obstacles which affect the ability of coverage of wireless sensor networks.…”
Get full text
Article -
67
Design and Study of LoRa-Based IIoT Network for Underground Coal Mine Environment
Published 2025-01-01“…The paper presents a novel LoRa-based IIoT system for monitoring the underground coal mine environment. Additionally, a new adaptive data rate algorithm for mesh network topology is proposed to optimize the data rate and maximize the coverage distance. …”
Get full text
Article -
68
The role of epigenetics in plant pathogens interactions under the changing environments: A systematic review
Published 2025-03-01“…The review highlights the co-evolutionary arms race between plants and pathogens, where pathogens manipulate host epigenetic machinery to suppress defenses, while plants deploy countermeasures to maintain immune resilience. …”
Get full text
Article -
69
Telefacturing Based Distributed Manufacturing Environment for Optimal Manufacturing Service by Enhancing the Interoperability in the Hubs
Published 2017-01-01“…Recent happenings are surrounding the manufacturing sector leading to intense progress towards the development of effective distributed collaborative manufacturing environments. This evolving collaborative manufacturing not only focuses on digitalisation of this environment but also necessitates service-dependent manufacturing system that offers an uninterrupted approach to a number of diverse, complicated, dynamic manufacturing operations management systems at a common work place (hub). …”
Get full text
Article -
70
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…The proposed technique can be deployed with minimal changes to existing cloud environment. …”
Get full text
Article -
71
Real-Time Interference Mitigation for Reliable Target Detection with FMCW Radar in Interference Environments
Published 2024-12-01“…Frequency-modulated continuous-wave (FMCW) millimeter-wave (mmWave) radar systems are increasingly utilized in environmental sensing due to their high range resolution and robust sensing ability in severe weather environments. …”
Get full text
Article -
72
DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis Environments
Published 2025-01-01“…The platform enables users to easily and automatically deploy interactive environments tailored for data analysis, thereby streamlining the process of managing computational resources. …”
Get full text
Article -
73
Research on machine vision online monitoring system for egg production and quality in cage environment
Published 2025-01-01“…This study introduces an online monitoring system designed for egg quality assessment within caged environments, incorporating a robotic patrol system for egg localization and a fixed video stream for quality analysis. …”
Get full text
Article -
74
Live video transmission optimization mechanism based on edge intelligence in high client-density environment
Published 2023-11-01“…The traditional live video transmission optimization mechanism is deployed on the server side, which cannot quickly respond to the dynamic changes of the user’s wireless network environment.To address this problem, a live video transmission optimization mechanism based on edge intelligence called S-Edge was proposed.It was deployed on the OpenWrt-based wireless access point, and comprehensively utilized the wireless channel state information such as airtime utilization and signal-to-noise ratio to make intelligent decisions on terminal priority and transmission rate based on fuzzy logic theory.Furthermore, the active queue management with hierarchical token bucket and service demand-driven wireless transmission rate adaptive control technologies were introduced to realize the real-time scheduling of live video data.In order to verify the effectiveness and performance of the proposed mechanism, a high client-density environment was built through user clusters based on multi-radio interfaces in the real-world scenario.Experimental results show that S-Edge can significantly reduce the average delay and packet loss rate, which meets QoS requirements of live video transmission services in the high client-density environment.…”
Get full text
Article -
75
Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment
Published 2025-01-01“…Finally, the paper spreads the bright light of advantages in deploying the proposed framework to formulate the most secured environment in the IoT-Edge environment for medical image transmission.…”
Get full text
Article -
76
Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment
Published 2018-11-01“…In the mobile network environment,the mobile honeypot resources are limited and the attack injection means are flexible,so it is necessary to dynamically deploy the honeynet to collaboratively detect the attack behavior characteristics.However,existing honey nets are susceptible to feature recognition attacks,malicious traffic within the network,and can’t be migrated across honeypots.Based on software defined networking (SDN) technology,an intelligent collaborative honeynet system (ic-Honeynet) was designed.It consisted of a reverse connection proxy module and a honeynet controller.Finally,an ic-Honeynet experimental environment was built and the effectiveness of the system was verified.The experimental results show that the throughput of the system is nearly linear,up to 8.23 Gbit/s; the additional increase in response delay is small,only in the range of 0.5 to 1.2 ms; the connection processing capability is also very strong,up to 1 473 connections/s.…”
Get full text
Article -
77
An UAV-Assisted Edge Computing Resource Allocation Strategy for 5G Communication in IoT Environment
Published 2022-01-01“…First, a system model is constructed with the UAV deployed with mobile edge computing (MEC) servers to provide assisted computing services for multiple users on the ground. …”
Get full text
Article -
78
Aptamers as the Agent in Decontamination Assays (Apta-Decontamination Assays): From the Environment to the Potential Application In Vivo
Published 2017-01-01“…Aptamers have been successfully harnessed as the decontamination agents to remove contaminants from the environment and to decontaminate infectious elements. …”
Get full text
Article -
79
Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments
Published 2025-01-01“…These results underscore the relevance and effectiveness of the SICNN model in enhancing IoT security, making it a promising solution for real-time intrusion detection in dynamic IoT environments.…”
Get full text
Article -
80