Showing 421 - 440 results of 1,810 for search '((\ resource detection function\ ) OR ((\ source OR \ sources) detection function\ ))', query time: 0.41s Refine Results
  1. 421
  2. 422

    Cascaded Directional Coupler-Based Triplexer Working on Spectroscopically Relevant Wavelengths for Multiple Gas Detection by Ajmal Thottoli, Gabriele Biagi, Artem S. Vorobev, Antonella D’Orazio, Giovanni Magno, Liam O’Faolain

    Published 2025-02-01
    “…The results highlight the triplexer’s capability as a multifunctional beam combiner and an adaptable power source, essential for advanced gas sensing techniques and integrated couplers.…”
    Get full text
    Article
  3. 423

    Harnessing Deep Learning With AlexNet for Tomato Leaf Disease Detection in the Indian Himalayan Terrain by Ruchika Sharma, Sameena Naaz, Pankaj Vaidya

    Published 2025-01-01
    “…Agriculture is essential for living in the Indian Himalayan region (IHR), as it functions as the main occupation and source of income. …”
    Get full text
    Article
  4. 424

    Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region by Beijing XIE, Heng LI, Zheng LUAN, Zhen LEI, Xiaoxu LI, Zhuo LI

    Published 2025-02-01
    “…Compared to various lightweight architectures and advanced detection models, this method demonstrates excellent accuracy, lower computational costs, and better real-time performance, providing a feasible coal mine pedestrian-vehicle detection method for resource-constrained coal mine scenarios, meeting the deployment requirements of coal mine video surveillance and enabling real-time alerts for intelligent inspection of coal mine pedestrian-vehicles.…”
    Get full text
    Article
  5. 425

    Energy-Efficiency using Critical Nodes Detection Problem in Industrial Wireless Sensor Networks (IWSNs) by Karima MOULEY, Mohamed Amin TAHRAOUI, Abdelaziz KELLA

    Published 2025-03-01
    “…Experiments simulation validates our proposed approach, approving its efficiency in reducing significant energy consumption while preserving connectivity and functionality for industrial systems. Furthermore, the results highlight the potential of using critical node analysis to support sustainable and efficient operations in resource-constrained industrial environments. …”
    Get full text
    Article
  6. 426

    Detection of VOCs and Biogenic Amines Through Luminescent Zn–Salen Complex-Tethered Pyrenyl Arms by Roberta Puglisi, Caterina Testa, Sara Scuderi, Valentina Greco, Giuseppe Trusso Sfrazzetto, Manuel Petroselli, Andrea Pappalardo

    Published 2024-12-01
    “…Biogenic amines, resulting from the natural decarboxylation of amino acids, are released into the environment from both natural and industrial sources. Several methods have been developed so far to detect amines in the environment. …”
    Get full text
    Article
  7. 427

    Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms by Jinmo Yang, R. Young Chul Kim

    Published 2024-01-01
    “…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
    Get full text
    Article
  8. 428

    Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability by Vincent Zibi Mohale, Ibidun Christiana Obagbuwa

    Published 2025-05-01
    “…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
    Get full text
    Article
  9. 429

    Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection by Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
    Get full text
    Article
  10. 430

    Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning by Ali Altalbe

    Published 2024-01-01
    “…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
    Get full text
    Article
  11. 431

    F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection by Muhammad Rashid Minhas, Qaisar M. Shafi, Shoab Ahmed Khan, Tahir Ahmad, Subhan Ullah, Attaullah Buriro, Muhammad Azfar Yaqub

    Published 2025-01-01
    “…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
    Get full text
    Article
  12. 432
  13. 433

    Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies by Jianxian Wang, Hazlie Mokhlis, Nurulafiqah Nadzirah Mansor, Hazlee Azil Illias, Agileswari K. Ramasamy, Xingyu Wu, Siqi Wang

    Published 2025-01-01
    “…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
    Get full text
    Article
  14. 434

    DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK by N Suganthi, R Meenakshi, A Sairam, M Parvathi

    Published 2025-06-01
    “…The approach integrates a Decision Tree (DT) algorithm for rapid initial classification of Primary User (PU) activity, followed by a Hill Climbing (HC) optimization algorithm that fine-tunes the detection based on a fitness function. Entropy and throughput metrics are employed as decision conditions at each sensing channel, enhancing uncertainty measurement and maintaining detection robustness under low Signal-to-Noise Ratio (SNR) conditions. …”
    Get full text
    Article
  15. 435
  16. 436

    TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5 by Han Wang, Zhenwei Yang, Qiaoshou Liu, Qiang Zhang, Honggang Wang

    Published 2025-05-01
    “…Finally, the EIOU loss function is introduced to measure the overlap between the predicted box and the real box more accurately and improve the detection accuracy. …”
    Get full text
    Article
  17. 437

    YOLOv8n-DDSW: an efficient fish target detection network for dense underwater scenes by Jinwang Yi, Wei Han, Fangfei Lai

    Published 2025-04-01
    “…Therefore, the YOLOv8n-DDSW fish target detection algorithm was proposed in this article to resolve the detection difficulties resulting from fish occlusion, deformation and detail loss in complex intensive aquaculture scenarios. (1) The C2f-deformable convolutional network (DCN) module is proposed to take the place of the C2f module in the YOLOv8n backbone to raise the detection accuracy of irregular fish targets. (2) The dual-pooling squeeze-and-excitation (DPSE) attention mechanism is put forward and integrated into the YOLOv8n neck network to reinforce the features of the visible parts of the occluded fish target. (3) Small detection is introduced to make the network more capable of sensing small targets and improving recall. (4) Wise intersection over union (IOU) rather than the original loss function is used for improving the bounding box regression performance of the network. …”
    Get full text
    Article
  18. 438
  19. 439
  20. 440