Search alternatives:
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
-
421
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article -
422
Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies
Published 2025-01-01“…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
Get full text
Article -
423
Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber
Published 2018-01-01“…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
Get full text
Article -
424
Deception mechanisms of FDA‒AWACS against passive monopulse angle measurements
Published 2024-11-01Get full text
Article -
425
Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg...
Published 2025-05-01“…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
Get full text
Article -
426
Unveiling the placental bacterial microbiota: implications for maternal and infant health
Published 2025-03-01Get full text
Article -
427
A fuzzy method for improving the functionality of search engines based on user's web interactions
Published 2015-04-01Get full text
Article -
428
Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction
Published 2016-01-01“…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
Get full text
Article -
429
-
430
FCMI-YOLO: An efficient deep learning-based algorithm for real-time fire detection on edge devices.
Published 2025-01-01“…The rapid development of Internet of Things (IoT) technology and deep learning has propelled the deployment of vision-based fire detection algorithms on edge devices, significantly exacerbating the trade-off between accuracy and inference speed under hardware resource constraints. …”
Get full text
Article -
431
Research on a Target Detection Algorithm for Common Pests Based on an Improved YOLOv7-Tiny Model
Published 2024-12-01“…In agriculture and forestry, pest detection is critical for increasing crop yields and reducing economic losses. …”
Get full text
Article -
432
YOLOv8-CBSE: An Enhanced Computer Vision Model for Detecting the Maturity of Chili Pepper in the Natural Environment
Published 2025-02-01“…Additionally, SRFD and DRFD modules are introduced to replace the original convolutional layers, effectively capturing features at different scales and enhancing the diversity and adaptability of the model through the feature fusion mechanism. To further improve detection accuracy, the EIoU loss function is used instead of the CIoU loss function to provide more comprehensive loss information. …”
Get full text
Article -
433
A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection
Published 2025-03-01“…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
Get full text
Article -
434
Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI
Published 2024-12-01“…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
Get full text
Article -
435
STar-DETR: A Lightweight Real-Time Detection Transformer for Space Targets in Optical Sensor Systems
Published 2025-02-01“…Optical sensor systems are essential for space target detection. However, previous studies have prioritized detection accuracy over model efficiency, limiting their deployment on resource-constrained sensors. …”
Get full text
Article -
436
PdYOLO: A Lightweight Algorithm for Detecting Peach Fruits Against a Peach Tree Background
Published 2024-01-01“…First, the CIOU regression loss function in YOLOv8s is replaced with the WIoUv2 regression loss function, effectively alleviating the negative impact of uneven distribution of positive and negative samples during model training through a more balanced gradient gain distribution strategy, which significantly improves detection accuracy. …”
Get full text
Article -
437
Hierarchical Deep Learning Model Optimization Using Enhanced Evolutionary-based Approach for Fake News Detection
Published 2025-01-01“…It employs an enhanced genetic algorithm (GA) with a unique fitness function, dynamic crossover, and adaptive mutation strategies to achieve model compression, maintain accuracy, and balance exploration and exploitation during evolution. …”
Get full text
Article -
438
Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly
Published 2025-04-01“…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
Get full text
Article -
439
Improved Building Information Modeling Based Method for Prioritizing Clash Detection in the Building Construction Design Phase
Published 2024-11-01“…The proposed method substantially improves clash detection and prioritization efficiency and accuracy, yielding considerable benefits in project management and resource allocation.…”
Get full text
Article -
440
YOLOv10-kiwi: a YOLOv10-based lightweight kiwifruit detection model in trellised orchards
Published 2025-08-01“…To address the challenge of real-time kiwifruit detection in trellised orchards, this paper proposes YOLOv10-Kiwi, a lightweight detection model optimized for resource-constrained devices. …”
Get full text
Article