Search alternatives:
functions » function (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 401 - 420 results of 1,810 for search '((( resource OR resources) detection functions ) OR ( source detection functions ))', query time: 0.29s Refine Results
  1. 401
  2. 402

    A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM by Shuroog Alsaleh, Mohamed El Bachir Menai, Saad Al-Ahmadi

    Published 2025-02-01
    “…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
    Get full text
    Article
  3. 403
  4. 404
  5. 405

    Machine learning-based model for acute asthma exacerbation detection using routine blood parameters by Youpeng Chen, Junquan Sun, Yabang Chen, Enzhong Li, Jiancai Lu, Huanhua Tang, Yifei Xie, Jiana Zhang, Lesi Peng, Haojie Wu, Zhangkai J. Cheng, Baoqing Sun

    Published 2025-07-01
    “…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
    Get full text
    Article
  6. 406

    YOLO11m-SCFPose: An Improved Detection Framework for Keypoint Extraction in Cucumber Fruit Phenotyping by Huijiao Yu, Xuehui Zhang, Jun Yan, Xianyong Meng

    Published 2025-07-01
    “…This model demonstrates better computational efficiency and lower resource consumption, providing an effective lightweight solution for crop phenotypic analysis.…”
    Get full text
    Article
  7. 407

    Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms by Jinmo Yang, R. Young Chul Kim

    Published 2024-01-01
    “…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
    Get full text
    Article
  8. 408

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  9. 409

    SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr... by Hiroya Umeda, Masami Ouchi, Satoshi Kikuta, Yuichi Harikane, Yoshiaki Ono, Takatoshi Shibuya, Akio K. Inoue, Kazuhiro Shimasaku, Yongming Liang, Akinori Matsumoto, Shun Saito, Haruka Kusakabe, Yuta Kageura, Minami Nakane

    Published 2025-01-01
    “…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z  = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
    Get full text
    Article
  10. 410

    Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture by Bekir Eray Katı, Ecir Uğur Küçüksille, Güncel Sarıman

    Published 2025-01-01
    “…The model’s performance was compared with other methods evaluated on the DFDC dataset, highlighting its efficiency in resource utilization and overall effectiveness. The findings reveal that the proposed QTL-CaiT-based system provides a strong foundation for deepfake detection and contributes significantly to the academic literature. …”
    Get full text
    Article
  11. 411

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article
  12. 412

    Automated Artery Detection and Stenosis Classification in CTA Using Deep Learning for Peripheral Arterial Disease by Ali M. O. A. Anwer, Hacer Karacan, Muhammed Rabee, Levent Enver, Gonca Cabuk

    Published 2025-01-01
    “…Peripheral Arterial Disease (PAD) is one of the most important cardiovascular diseases worldwide for several million humans, associated with substantial morbidity, mortality, and healthcare resource utilization. Computed Tomography Angiography (CTA) is a high-quality imaging modality in PAD diagnostics, which directly highlights the vasculature having high resolution. …”
    Get full text
    Article
  13. 413

    F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection by Muhammad Rashid Minhas, Qaisar M. Shafi, Shoab Ahmed Khan, Tahir Ahmad, Subhan Ullah, Attaullah Buriro, Muhammad Azfar Yaqub

    Published 2025-01-01
    “…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
    Get full text
    Article
  14. 414

    DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK by N Suganthi, R Meenakshi, A Sairam, M Parvathi

    Published 2025-06-01
    “…The approach integrates a Decision Tree (DT) algorithm for rapid initial classification of Primary User (PU) activity, followed by a Hill Climbing (HC) optimization algorithm that fine-tunes the detection based on a fitness function. Entropy and throughput metrics are employed as decision conditions at each sensing channel, enhancing uncertainty measurement and maintaining detection robustness under low Signal-to-Noise Ratio (SNR) conditions. …”
    Get full text
    Article
  15. 415

    Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability by Vincent Zibi Mohale, Ibidun Christiana Obagbuwa

    Published 2025-05-01
    “…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
    Get full text
    Article
  16. 416

    Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection by Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
    Get full text
    Article
  17. 417
  18. 418
  19. 419

    GastroEndoNet: Comprehensive endoscopy image dataset for GERD and polyp detectionMendeley Data by Abu Kowshir Bitto, Md. Hasan Imam Bijoy, Kamrul Hassan Shakil, Aka Das, Khalid Been Badruzzaman Biplob, Imran Mahmud, Syed Md. Minhaz Hossain

    Published 2025-06-01
    “…It provides an invaluable resource for developing machine learning models aimed at the automatic diagnosis, classification, and detection of GERD and polyps, potentially improving the speed and accuracy of clinical decision-making. …”
    Get full text
    Article
  20. 420

    TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5 by Han Wang, Zhenwei Yang, Qiaoshou Liu, Qiang Zhang, Honggang Wang

    Published 2025-05-01
    “…However, autonomous vehicles deal with large amounts of real-time data, which places extremely high demands on computing resources. Therefore, a lightweight object detection algorithm based on YOLOv5 is proposed to solve the problem of excessive network parameters in automatic driving scenarios. …”
    Get full text
    Article