Search alternatives:
functions » function (Expand Search)
Showing 381 - 400 results of 1,810 for search '((( source OR resources) detection functions ) OR ( sources detection functions ))', query time: 0.36s Refine Results
  1. 381

    A review on WSN based resource constrained smart IoT systems by Shreeram Hudda, K. Haribabu

    Published 2025-05-01
    “…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
    Get full text
    Article
  2. 382

    Phenotypic variation of Thenus spp. (Decapoda, Scyllaridae) in the waters of southern Thailand and Malaysia using multivariate morphometric analysis by Ihsan Hani Radzi, Cheng-Ann Chen, Sukree Hajisamae, Kay Khine Soe

    Published 2025-01-01
    “… Thenus spp. are slipper lobsters which are commercially significant as a food source with good aquaculture potential. This study focuses on collecting population information on Thenus orientalis and Thenus indicus from selected sites in southern Thailand and Malaysia to inform sustainable fisheries management about the resources. …”
    Get full text
    Article
  3. 383
  4. 384

    Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility by Zhuqi Li, Wangyu Wu, Bingcai Wei, Hao Li, Jingbo Zhan, Songtao Deng, Jian Wang

    Published 2025-04-01
    “…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
    Get full text
    Article
  5. 385

    Molecular signature of selective microRNAs in Cyprinus carpio (Linnaeus 1758):a computational approach by Soumendu Ghosh, Manojit Bhattacharya, Avijit Kar, Basanta Kumar Das, Bidhan Chandra Patra

    Published 2019-03-01
    “…Their conserved nature in various organisms provide a good source of miRNA identification and characterization using comparative genomic approaches through the bio-computational tools. …”
    Get full text
    Article
  6. 386

    Multi-Robot Cooperative Simultaneous Localization and Mapping Algorithm Based on Sub-Graph Partitioning by Wan Xu, Yanliang Chen, Shijie Liu, Ao Nie, Rupeng Chen

    Published 2025-05-01
    “…First, a global matching and candidate loop selection strategy is incorporated into the front-end loop detection module, leveraging both LiDAR point clouds and visual features to achieve cross-robot loop detection, effectively mitigating computational redundancy and reducing false matches in collaborative multi-robot systems. …”
    Get full text
    Article
  7. 387

    SynergyBug: A deep learning approach to autonomous debugging and code remediation by Hong Chen

    Published 2025-07-01
    “…The system demonstrated exceptional detection strength for functional and performance, and security bugs, where the detection rates reached 94% and 90% and 92%, respectively. …”
    Get full text
    Article
  8. 388
  9. 389

    A lightweight framework to secure IoT devices with limited resources in cloud environments by Vivek Kumar Pandey, Dinesh Sahu, Shiv Prakash, Rajkumar Singh Rathore, Pratibha Dixit, Iryna Hunko

    Published 2025-07-01
    “…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
    Get full text
    Article
  10. 390

    Simulating Self-lensing and Eclipsing Signals due to Detached Compact Objects in the TESS Light Curves by Sedighe Sajadian, Niayesh Afshordi

    Published 2024-01-01
    “…The shape of a self-lensing signal is a degenerate function of stellar radius and the compact object’s mass because the self-lensing peak strongly depends on the projected source radius normalized to the Einstein radius. …”
    Get full text
    Article
  11. 391

    Rprot-Vec: a deep learning approach for fast protein structure similarity calculation by Yichuan Zhang, Wen Zhang

    Published 2025-07-01
    “…It can be applied in protein homology detection, structure-function inference, drug repurposing, and other downstream biological tasks. …”
    Get full text
    Article
  12. 392

    Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions by Jan Berghöfer, Nadia Khaveh, Stefan Mundlos, Julia Metzger

    Published 2025-03-01
    “…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
    Get full text
    Article
  13. 393
  14. 394

    Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information by Raik Kuhlisch

    Published 2017-07-01
    “…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
    Get full text
    Article
  15. 395

    Characterization of Biocalcium Microparticles from Saltwater Crocodile (<i>Crocodylus porosus</i>) Bone and Their Potential for Enhancing Fish Bologna Quality by Theeraphol Senphan, Natthapong Mungmueang, Supatra Karnjanapratum, Sutee Wangtueai, Akkasit Jongjareonrak, Suthasinee Yarnpakdee

    Published 2025-05-01
    “…Saltwater crocodile (SC; <i>Crocodylus porosus</i>) bone, an underutilized by-product, can be converted into high-value bio-calcium (Biocal), serving as a potential source of calcium and minerals. This study aimed to produce SC bone Biocal as functional gel enhancer for fish bologna development and to increase calcium intake. …”
    Get full text
    Article
  16. 396
  17. 397

    Western spotted skunk spatial ecology in the temperate rainforests of the Pacific Northwest by Marie I. Tosa, Damon B. Lesmeister, Taal Levi

    Published 2024-08-01
    “…Using these home ranges, we fitted a resource selection function using environmental covariates that we assigned to various hypotheses such as resources, predator avoidance, thermal tolerance, and disturbance. …”
    Get full text
    Article
  18. 398

    Scalable Video Processing and Frame Analysis System for Automated Monitoring of Chicken Behavior Based on Artificial Intelligence Technologies by Svitlana Antoshchuk, Oleksii Danchuk, Tetiana Kunup

    Published 2025-04-01
    “…The article highlights the advantages of using automated systems to monitor chicken health under conditions of limited human resources. A software solution has been developed for monitoring chicken health, which enables video uploads from local sources or video services such as YouTube, selection of the communication language, and the LLM model. …”
    Get full text
    Article
  19. 399

    A statistical framework for analysis of trial-level temporal dynamics in fiber photometry experiments by Gabriel Loewinger, Erjia Cui, David Lovinger, Francisco Pereira

    Published 2025-03-01
    “…Fiber photometry has become a popular technique to measure neural activity in vivo, but common analysis strategies can reduce the detection of effects because they condense within-trial signals into summary measures, and discard trial-level information by averaging across-trials. …”
    Get full text
    Article
  20. 400

    Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets by Muhammad Zeeshan, Qaiser Riaz, Muhammad Ahmad Bilal, Muhammad K. Shahzad, Hajira Jabeen, Syed Ali Haider, Azizur Rahim

    Published 2022-01-01
    “…As this technology advances further, the need to exploit detection and weakness awareness increases to prevent unauthorized access to critical resources and business functions, thereby rendering the system unavailable. …”
    Get full text
    Article