-
381
A review on WSN based resource constrained smart IoT systems
Published 2025-05-01“…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
Get full text
Article -
382
Phenotypic variation of Thenus spp. (Decapoda, Scyllaridae) in the waters of southern Thailand and Malaysia using multivariate morphometric analysis
Published 2025-01-01“… Thenus spp. are slipper lobsters which are commercially significant as a food source with good aquaculture potential. This study focuses on collecting population information on Thenus orientalis and Thenus indicus from selected sites in southern Thailand and Malaysia to inform sustainable fisheries management about the resources. …”
Get full text
Article -
383
CdZnTe- and TlBr-detectors response simulation for registration of the mixed beta- and gamma-radiation
Published 2015-02-01Get full text
Article -
384
Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility
Published 2025-04-01“…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
Get full text
Article -
385
Molecular signature of selective microRNAs in Cyprinus carpio (Linnaeus 1758):a computational approach
Published 2019-03-01“…Their conserved nature in various organisms provide a good source of miRNA identification and characterization using comparative genomic approaches through the bio-computational tools. …”
Get full text
Article -
386
Multi-Robot Cooperative Simultaneous Localization and Mapping Algorithm Based on Sub-Graph Partitioning
Published 2025-05-01“…First, a global matching and candidate loop selection strategy is incorporated into the front-end loop detection module, leveraging both LiDAR point clouds and visual features to achieve cross-robot loop detection, effectively mitigating computational redundancy and reducing false matches in collaborative multi-robot systems. …”
Get full text
Article -
387
SynergyBug: A deep learning approach to autonomous debugging and code remediation
Published 2025-07-01“…The system demonstrated exceptional detection strength for functional and performance, and security bugs, where the detection rates reached 94% and 90% and 92%, respectively. …”
Get full text
Article -
388
-
389
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
Get full text
Article -
390
Simulating Self-lensing and Eclipsing Signals due to Detached Compact Objects in the TESS Light Curves
Published 2024-01-01“…The shape of a self-lensing signal is a degenerate function of stellar radius and the compact object’s mass because the self-lensing peak strongly depends on the projected source radius normalized to the Einstein radius. …”
Get full text
Article -
391
Rprot-Vec: a deep learning approach for fast protein structure similarity calculation
Published 2025-07-01“…It can be applied in protein homology detection, structure-function inference, drug repurposing, and other downstream biological tasks. …”
Get full text
Article -
392
Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions
Published 2025-03-01“…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
Get full text
Article -
393
-
394
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01“…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
Get full text
Article -
395
Characterization of Biocalcium Microparticles from Saltwater Crocodile (<i>Crocodylus porosus</i>) Bone and Their Potential for Enhancing Fish Bologna Quality
Published 2025-05-01“…Saltwater crocodile (SC; <i>Crocodylus porosus</i>) bone, an underutilized by-product, can be converted into high-value bio-calcium (Biocal), serving as a potential source of calcium and minerals. This study aimed to produce SC bone Biocal as functional gel enhancer for fish bologna development and to increase calcium intake. …”
Get full text
Article -
396
-
397
Western spotted skunk spatial ecology in the temperate rainforests of the Pacific Northwest
Published 2024-08-01“…Using these home ranges, we fitted a resource selection function using environmental covariates that we assigned to various hypotheses such as resources, predator avoidance, thermal tolerance, and disturbance. …”
Get full text
Article -
398
Scalable Video Processing and Frame Analysis System for Automated Monitoring of Chicken Behavior Based on Artificial Intelligence Technologies
Published 2025-04-01“…The article highlights the advantages of using automated systems to monitor chicken health under conditions of limited human resources. A software solution has been developed for monitoring chicken health, which enables video uploads from local sources or video services such as YouTube, selection of the communication language, and the LLM model. …”
Get full text
Article -
399
A statistical framework for analysis of trial-level temporal dynamics in fiber photometry experiments
Published 2025-03-01“…Fiber photometry has become a popular technique to measure neural activity in vivo, but common analysis strategies can reduce the detection of effects because they condense within-trial signals into summary measures, and discard trial-level information by averaging across-trials. …”
Get full text
Article -
400
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01“…As this technology advances further, the need to exploit detection and weakness awareness increases to prevent unauthorized access to critical resources and business functions, thereby rendering the system unavailable. …”
Get full text
Article