-
441
Machine learning-based model for acute asthma exacerbation detection using routine blood parameters
Published 2025-07-01“…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
Get full text
Article -
442
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM
Published 2025-02-01“…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
Get full text
Article -
443
A fuzzy method for improving the functionality of search engines based on user's web interactions
Published 2015-04-01Get full text
Article -
444
Enhancing Human Detection in Occlusion-Heavy Disaster Scenarios: A Visibility-Enhanced DINO (VE-DINO) Model with Reassembled Occlusion Dataset
Published 2025-01-01“…VE-DINO enhances detection accuracy by incorporating body part key point information and employing a specialized loss function. …”
Get full text
Article -
445
Multimodal imaging analysis and structure-function correlation in patients exposed to pentosan polysulfate sodium
Published 2025-07-01“…Purpose: To study the anatomic and functional retinal changes in patients exposed to pentosan polysulfate (PPS) using multimodal imaging and mesopic microperimetry. …”
Get full text
Article -
446
Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region
Published 2025-02-01“…Compared to various lightweight architectures and advanced detection models, this method demonstrates excellent accuracy, lower computational costs, and better real-time performance, providing a feasible coal mine pedestrian-vehicle detection method for resource-constrained coal mine scenarios, meeting the deployment requirements of coal mine video surveillance and enabling real-time alerts for intelligent inspection of coal mine pedestrian-vehicles.…”
Get full text
Article -
447
Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction
Published 2016-01-01“…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
Get full text
Article -
448
-
449
DNA-Based Nanobiosensor for the Colorimetric Detection of Dengue Virus Serotype 2 Synthetic Target Oligonucleotide
Published 2025-01-01“…Being a developing country, most of the high-risk areas in the Philippines are resource-limited and cannot afford equipment for detection and monitoring. …”
Get full text
Article -
450
Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms
Published 2024-01-01“…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
Get full text
Article -
451
F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection
Published 2025-01-01“…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
Get full text
Article -
452
Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning
Published 2024-01-01“…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
Get full text
Article -
453
Deception mechanisms of FDA‒AWACS against passive monopulse angle measurements
Published 2024-11-01Get full text
Article -
454
-
455
A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection
Published 2025-03-01“…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
Get full text
Article -
456
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
457
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
458
Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning
Published 2025-07-01“…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
Get full text
Article -
459
Multivariate GWAS analysis reveals loci associated with liver functions in continental African populations.
Published 2023-01-01“…<h4>Conclusions</h4>Using multivariate GWAS method improves the power to detect novel genotype-phenotype associations for liver functions not found with the standard univariate GWAS in the same dataset.…”
Get full text
Article -
460
SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC
Published 2025-07-01“…A set of 3729 BPMN models from the Camunda open source repository was used for experimental calculations. …”
Get full text
Article