-
561
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article -
562
-
563
Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies
Published 2025-01-01“…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
Get full text
Article -
564
Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber
Published 2018-01-01“…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
Get full text
Article -
565
Function over form: The benefits of aspen as surrogate brood‐rearing habitat for greater sage‐grouse
Published 2024-12-01Get full text
Article -
566
Deception mechanisms of FDA‒AWACS against passive monopulse angle measurements
Published 2024-11-01Get full text
Article -
567
-
568
Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg...
Published 2025-05-01“…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
Get full text
Article -
569
Unveiling the placental bacterial microbiota: implications for maternal and infant health
Published 2025-03-01Get full text
Article -
570
-
571
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
Published 2022-04-01“…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
Get full text
Article -
572
Advancements in Nanostructured Functional Constituent Materials for Gas Sensing Applications: A Comprehensive Review
Published 2025-02-01“…By providing a comprehensive and up-to-date analysis, this review serves as a valuable resource for researchers and engineers, offering insights that can drive the next generation of high-performance, reliable, and selective gas sensors.…”
Get full text
Article -
573
A fuzzy method for improving the functionality of search engines based on user's web interactions
Published 2015-04-01Get full text
Article -
574
Natural variation of ClCCT promoter promotes flowering and dwarfing in adlay (Coix lacryma-jobi L.)
Published 2025-06-01Get full text
Article -
575
-
576
-
577
-
578
pH-tuneable simultaneous and selective dye wastewater remediation with digestate-derived biochar: adsorption behaviour, mechanistic insights and potential application
Published 2025-09-01“…This adsorbent exhibited both selective and simultaneous dye adsorption upon pH control, mainly attributable to a multi-interaction process in the medium. …”
Get full text
Article -
579
-
580
A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection
Published 2025-03-01“…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
Get full text
Article