Suggested Topics within your search.
Suggested Topics within your search.
-
701
SECURITY ASSESSMENT OF MOODLE-BASED DISTANCE LEARNING SYSTEM COMPONENTS USING STATIC ANALYSIS TOOLS
Published 2025-07-01“…Moodle is one of the most popular open source solutions used in university environments, and its modular architecture requires regular security audits due to continuous functional expansion. …”
Get full text
Article -
702
Terrain and individual tree vertical structure-based approach for point clouds co-registration by UAV and Backpack LiDAR
Published 2025-05-01“…Tree-level structural parameters estimation plays a key role in the researches and practice in sustainable forest management, carbon storage estimation, as well as ecological function evaluation. However, single Light Detection and Ranging (LiDAR) platform exhibits limitations when acquiring complete (i.e., including over-story and under-story) point cloud data for forest stands, e.g., UAV LiDAR systems tend to overlook details of the tree trunk or the lower ground, while Backpack LiDAR systems struggle to capture the treetop, etc. …”
Get full text
Article -
703
Scalable Video Processing and Frame Analysis System for Automated Monitoring of Chicken Behavior Based on Artificial Intelligence Technologies
Published 2025-04-01“…The article highlights the advantages of using automated systems to monitor chicken health under conditions of limited human resources. A software solution has been developed for monitoring chicken health, which enables video uploads from local sources or video services such as YouTube, selection of the communication language, and the LLM model. …”
Get full text
Article -
704
Integrated Waveform Design of Radar and Communication Based on Chirp-rate Hopping Modulation
Published 2025-04-01“…The increasing demand for spectrum resources and the need for reducing the burden of modern electronic combat platforms have prompted the development of integrated radar and communication systems. …”
Get full text
Article -
705
Deformable Feature Fusion and Accurate Anchors Prediction for Lightweight SAR Ship Detector Based on Dynamic Hierarchical Model Pruning
Published 2025-01-01“…Moreover, the large number of parameters in CNNs restricts their deployment on platforms with limited resources. To address these challenges, this article proposes a novel SAR ship detection network called DFES-Net, which incorporates deformable feature fusion and accurate anchor prediction to enhance detection performance. …”
Get full text
Article -
706
-
707
Dynamic participation in local energy communities with peer-to-peer trading [version 2; peer review: 2 approved, 2 approved with reservations]
Published 2024-10-01“…Conclusions The added value of this work is that the proposed method can be seen as a basis for a selection process between a large number of potential new community members. …”
Get full text
Article -
708
-
709
LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification
Published 2025-08-01“…LiSA-MobileNetV2 provides a high-accuracy, resource-efficient solution for real-time rice disease detection in smart farming systems.…”
Get full text
Article -
710
Screening Tests to Identify Injury Risk in Competitive Swimmers: A Scoping Review
Published 2025-07-01“…A quality rating for the selected studies was conducted using the National Institutes of Health (NIH) study-quality assessment tool. …”
Get full text
Article -
711
Attention-Module-Guided Time-Lapse Leakage Plume Imaging Driven by LeakInv-CUNet GPR Inversion Framework
Published 2025-01-01Get full text
Article -
712
Evaluation of response to a cholera outbreak in January 2024 using the 7–1–7 timeliness metrics: a case study of Elegu Point of Entry, Uganda
Published 2024-12-01“…Achieving the 7–1–7 targets highlighted the country’s-built capacity to detect, notify, and respond to such events. Continued investment in local-level disease detection, communication, and national-level resource mobilization will be crucial to sustaining future effective cross-border outbreak prevention and control strategies.…”
Get full text
Article -
713
-
714
Combining first principles and machine learning for rapid assessment response of WO3 based gas sensors
Published 2024-12-01“…The rapid advancement of gas sensitive properties in metal oxides is crucial for detecting hazardous gases in industrial and coal mining environments. …”
Get full text
Article -
715
Nazwy odantroponimiczne jako ekspresywne znaki pamięci wiejskiej wspólnoty językowo-kulturowej
Published 2024-12-01“…The source material was obtained during field research and includes short spoken texts illustrating how the discussed vocabulary functions in communication. …”
Get full text
Article -
716
Small-World Propensity Reveals the Frequency Specificity of Resting State Networks
Published 2020-01-01“…<italic>Goal:</italic> Functional connectivity (FC) is an important indicator of the brain's state in different conditions, such as rest/task or health/pathology. …”
Get full text
Article -
717
QPPLab: A generally applicable software package for detecting, analyzing, and visualizing large-scale quasiperiodic spatiotemporal patterns (QPPs) of brain activity
Published 2025-02-01“…Quasi-periodic patterns (QPPs) are prominent spatiotemporal brain dynamics observed in functional neuroimaging data, reflecting the alternation of high and low activity across brain regions and their propagation along cortical gradients. …”
Get full text
Article -
718
MARKEDNESS OF THEME IN EVERYTHING, EVERYTHING MOVIE DIALOG
Published 2020-12-01“…The theory that is used in this research is Systemic Functional Linguistics (SFL) proposed by Halliday (1994), regarded with textual function that observes clause as a message and analyzes it from the thematic structure in the term of Theme-Rheme. …”
Get full text
Article -
719
-
720
Battery Management System: Threat Modeling, Vulnerability Analysis, and Cybersecurity Strategy
Published 2025-01-01“…Unauthorized access or tampering with the BMS can disrupt its fault response mechanisms, jeopardizing system performance and associated resources. Key cybersecurity strategies include intrusion detection systems (IDS), crypto-based authentication, secure firmware updates, and hardware-based security mechanisms such as trusted platform modules (TPMs). …”
Get full text
Article