Showing 441 - 460 results of 1,810 for search '((( source OR sources) detection functions ) OR ( resources detection function ))', query time: 0.21s Refine Results
  1. 441

    Machine learning-based model for acute asthma exacerbation detection using routine blood parameters by Youpeng Chen, Junquan Sun, Yabang Chen, Enzhong Li, Jiancai Lu, Huanhua Tang, Yifei Xie, Jiana Zhang, Lesi Peng, Haojie Wu, Zhangkai J. Cheng, Baoqing Sun

    Published 2025-07-01
    “…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
    Get full text
    Article
  2. 442

    A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM by Shuroog Alsaleh, Mohamed El Bachir Menai, Saad Al-Ahmadi

    Published 2025-02-01
    “…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
    Get full text
    Article
  3. 443
  4. 444

    Enhancing Human Detection in Occlusion-Heavy Disaster Scenarios: A Visibility-Enhanced DINO (VE-DINO) Model with Reassembled Occlusion Dataset by Zi-An Zhao, Shidan Wang, Min-Xin Chen, Ye-Jiao Mao, Andy Chi-Ho Chan, Derek Ka-Hei Lai, Duo Wai-Chi Wong, James Chung-Wai Cheung

    Published 2025-01-01
    “…VE-DINO enhances detection accuracy by incorporating body part key point information and employing a specialized loss function. …”
    Get full text
    Article
  5. 445

    Multimodal imaging analysis and structure-function correlation in patients exposed to pentosan polysulfate sodium by Sandra Hoyek, Eleni Konstantinou, Francesco Romano, Darren Chen, Celine Chaaya, Magdalena G. Krzystolik, Daniel Hu, Rachel Huckfeldt, Demetrios G. Vavvas, Leo A. Kim, Jason Lee, Elise De, John B. Miller, Nimesh A. Patel

    Published 2025-07-01
    “…Purpose: To study the anatomic and functional retinal changes in patients exposed to pentosan polysulfate (PPS) using multimodal imaging and mesopic microperimetry. …”
    Get full text
    Article
  6. 446

    Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region by Beijing XIE, Heng LI, Zheng LUAN, Zhen LEI, Xiaoxu LI, Zhuo LI

    Published 2025-02-01
    “…Compared to various lightweight architectures and advanced detection models, this method demonstrates excellent accuracy, lower computational costs, and better real-time performance, providing a feasible coal mine pedestrian-vehicle detection method for resource-constrained coal mine scenarios, meeting the deployment requirements of coal mine video surveillance and enabling real-time alerts for intelligent inspection of coal mine pedestrian-vehicles.…”
    Get full text
    Article
  7. 447

    Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction by P. Kumudha, R. Venkatesan

    Published 2016-01-01
    “…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
    Get full text
    Article
  8. 448
  9. 449
  10. 450

    Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms by Jinmo Yang, R. Young Chul Kim

    Published 2024-01-01
    “…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
    Get full text
    Article
  11. 451

    F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection by Muhammad Rashid Minhas, Qaisar M. Shafi, Shoab Ahmed Khan, Tahir Ahmad, Subhan Ullah, Attaullah Buriro, Muhammad Azfar Yaqub

    Published 2025-01-01
    “…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
    Get full text
    Article
  12. 452

    Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning by Ali Altalbe

    Published 2024-01-01
    “…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
    Get full text
    Article
  13. 453
  14. 454
  15. 455

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  16. 456

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  17. 457

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  18. 458

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  19. 459

    Multivariate GWAS analysis reveals loci associated with liver functions in continental African populations. by Chisom Soremekun, Tafadzwa Machipisa, Opeyemi Soremekun, Fraser Pirie, Nashiru Oyekanmi, Ayesha A Motala, Tinashe Chikowore, Segun Fatumo

    Published 2023-01-01
    “…<h4>Conclusions</h4>Using multivariate GWAS method improves the power to detect novel genotype-phenotype associations for liver functions not found with the standard univariate GWAS in the same dataset.…”
    Get full text
    Article
  20. 460

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…A set of 3729 BPMN models from the Camunda open source repository was used for experimental calculations. …”
    Get full text
    Article