Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
-
401
-
402
Advancements in Nanostructured Functional Constituent Materials for Gas Sensing Applications: A Comprehensive Review
Published 2025-02-01“…High-end detection values may reach around a few ppb for most gases. …”
Get full text
Article -
403
SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr...
Published 2025-01-01“…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
Get full text
Article -
404
Dual Function Radar and Communication Waveform Design Based on Sub-pulse Hybrid Modulation
Published 2025-08-01“…To address the low data rate issue in the design of Dual-Function Radar-Communication (DFRC) waveforms with radar detection as the primary function, this paper proposes an information modulation method for multiple sub-pulse structure waveforms called Sub-pulse Hybrid Modulation (SHM). …”
Get full text
Article -
405
The Artificial Intelligence-Enhanced Echocardiographic Detection of Congenital Heart Defects in the Fetus: A Mini-Review
Published 2025-03-01“…We envision that, through the combination of tele-echocardiography and AI, low-resource medical facilities may gain access to the effective detection of CHD at the prenatal stage.…”
Get full text
Article -
406
Rice-SVBDete: a detection algorithm for small vascular bundles in rice stem’s cross-sections
Published 2025-05-01Get full text
Article -
407
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM
Published 2025-02-01“…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
Get full text
Article -
408
-
409
Machine learning-based model for acute asthma exacerbation detection using routine blood parameters
Published 2025-07-01“…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
Get full text
Article -
410
YOLO11m-SCFPose: An Improved Detection Framework for Keypoint Extraction in Cucumber Fruit Phenotyping
Published 2025-07-01“…This model demonstrates better computational efficiency and lower resource consumption, providing an effective lightweight solution for crop phenotypic analysis.…”
Get full text
Article -
411
Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms
Published 2024-01-01“…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
Get full text
Article -
412
Cascaded Directional Coupler-Based Triplexer Working on Spectroscopically Relevant Wavelengths for Multiple Gas Detection
Published 2025-02-01“…The triplexer’s functions focus on enhancing the coupling efficiency and selectivity, while facilitating the on-chip integration of diode lasers. …”
Get full text
Article -
413
Harnessing Deep Learning With AlexNet for Tomato Leaf Disease Detection in the Indian Himalayan Terrain
Published 2025-01-01“…Agriculture is essential for living in the Indian Himalayan region (IHR), as it functions as the main occupation and source of income. …”
Get full text
Article -
414
Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture
Published 2025-01-01“…The model’s performance was compared with other methods evaluated on the DFDC dataset, highlighting its efficiency in resource utilization and overall effectiveness. The findings reveal that the proposed QTL-CaiT-based system provides a strong foundation for deepfake detection and contributes significantly to the academic literature. …”
Get full text
Article -
415
CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8.
Published 2025-01-01“…The model achieves precision on par with existing mainstream algorithms, while being simpler, significantly reducing computational requirements, and being more suitable for small target detection tasks. The source code and test results of the models used in this study are available at https://github.com/lyzzzzyy/CSW-YOLO.git.…”
Get full text
Article -
416
Automated Artery Detection and Stenosis Classification in CTA Using Deep Learning for Peripheral Arterial Disease
Published 2025-01-01“…Peripheral Arterial Disease (PAD) is one of the most important cardiovascular diseases worldwide for several million humans, associated with substantial morbidity, mortality, and healthcare resource utilization. Computed Tomography Angiography (CTA) is a high-quality imaging modality in PAD diagnostics, which directly highlights the vasculature having high resolution. …”
Get full text
Article -
417
Detection of VOCs and Biogenic Amines Through Luminescent Zn–Salen Complex-Tethered Pyrenyl Arms
Published 2024-12-01“…Biogenic amines, resulting from the natural decarboxylation of amino acids, are released into the environment from both natural and industrial sources. Several methods have been developed so far to detect amines in the environment. …”
Get full text
Article -
418
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
Get full text
Article -
419
F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection
Published 2025-01-01“…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
Get full text
Article -
420
DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK
Published 2025-06-01“…The approach integrates a Decision Tree (DT) algorithm for rapid initial classification of Primary User (PU) activity, followed by a Hill Climbing (HC) optimization algorithm that fine-tunes the detection based on a fitness function. Entropy and throughput metrics are employed as decision conditions at each sensing channel, enhancing uncertainty measurement and maintaining detection robustness under low Signal-to-Noise Ratio (SNR) conditions. …”
Get full text
Article