Suggested Topics within your search.
Suggested Topics within your search.
-
201
Evaluation of Intrusion Detection Systems in Cyber Security using Fuzzy OffLogic and MCDM Approach
Published 2025-06-01Get full text
Article -
202
A multi-parameters assessment method and prediction model for ground vibration under the high-speed railway bridge
Published 2025-03-01“…Besides, an application example of environment vibration prediction was given, and the site selection distance threshold away from the high-speed railways of different types of environmental vibration function areas were determined. …”
Get full text
Article -
203
A review on WSN based resource constrained smart IoT systems
Published 2025-05-01“…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
Get full text
Article -
204
Antioxidant and Antiradical Properties of Selected Flavonoids and Phenolic Compounds
Published 2017-01-01Get full text
Article -
205
Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility
Published 2025-04-01“…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
Get full text
Article -
206
Biomimetic Microfluidic Pumps for Selective Oil–Water Separation
Published 2025-07-01“…The findings underscore the potential of 3D bionic functional spring microchannels for selectively separating a wide range of oil‐water mixtures with exceptional efficiency.…”
Get full text
Article -
207
Remote Sensing Extraction of Damaged Buildings in the Shigatse Earthquake, 2025: A Hybrid YOLO-E and SAM2 Approach
Published 2025-07-01“…The dataset used for training contained labeled examples of damaged buildings, and the model optimization was carried out using stochastic gradient descent (SGD), with cross-entropy and mean squared error as the selected loss functions. Upon evaluation, the model reached a precision of 0.840, a recall of 0.855, an F1-score of 0.847, and an IoU of 0.735. …”
Get full text
Article -
208
Selective transfer learning with adversarial training for stock movement prediction
Published 2022-12-01“…The data selector task is introduced to select the most relevant and high-quality training samples from stocks in source domain. …”
Get full text
Article -
209
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
Get full text
Article -
210
Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions
Published 2025-03-01“…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
Get full text
Article -
211
SPECIFICS OF PROJECT MANAGEMENT IN SELECTED ORGANIZATIONS PROVIDING SOCIAL SERVICES
Published 2025-05-01“…Project management is a key element that contributes to social service organizations' effective functioning and development. According to the literature, social projects can be funded from various sources, including government grants, private donations, and organizations' revenues. …”
Get full text
Article -
212
-
213
Evaluation of the diet of a selected group of children with coeliac disease
Published 2024-12-01Get full text
Article -
214
Phenolics and Flavonoid Content in Selected Seeds from the Serbian Market
Published 2024-02-01“…Conclusion: Our results confirmed the fact that certain defatted seeds, which are usually considered as waste products in oil production, could be considered as valuable sources of certain secondary plant metabolites, implicating further investigations on their composition and potential in the development of functional foods.…”
Get full text
Article -
215
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01“…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
Get full text
Article -
216
Donor – recipient selection using epitope mismatches in kidney transplantation
Published 2021-01-01“…If a recipient with a functioning graft died, the observation was censored. …”
Get full text
Article -
217
-
218
Western spotted skunk spatial ecology in the temperate rainforests of the Pacific Northwest
Published 2024-08-01“…Using these home ranges, we fitted a resource selection function using environmental covariates that we assigned to various hypotheses such as resources, predator avoidance, thermal tolerance, and disturbance. …”
Get full text
Article -
219
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01“…As this technology advances further, the need to exploit detection and weakness awareness increases to prevent unauthorized access to critical resources and business functions, thereby rendering the system unavailable. …”
Get full text
Article -
220
Selection and evaluation of reference genes for qRT-PCR in Inonotus obliquus
Published 2025-01-01“…Inonotus obliquus is a rare and edible medicinal fungus. Selecting an appropriate reference gene is crucial for researching its gene function. …”
Get full text
Article