Search alternatives:
source » sources (Expand Search)
resources » resourcess (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
resources » resourcess (Expand Search)
resource » resources (Expand Search)
-
421
F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection
Published 2025-01-01“…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
Get full text
Article -
422
Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability
Published 2025-05-01“…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
Get full text
Article -
423
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article -
424
DNA-Based Nanobiosensor for the Colorimetric Detection of Dengue Virus Serotype 2 Synthetic Target Oligonucleotide
Published 2025-01-01“…Being a developing country, most of the high-risk areas in the Philippines are resource-limited and cannot afford equipment for detection and monitoring. …”
Get full text
Article -
425
Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring
Published 2022-11-01“…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
Get full text
Article -
426
SHIVA-CMB: a deep-learning-based robust cerebral microbleed segmentation tool trained on multi-source T2*GRE- and susceptibility-weighted MRI
Published 2024-12-01“…An increasing number of automated CMB detection methods being proposed are based on supervised deep learning (DL). …”
Get full text
Article -
427
Dual Function Radar and Communication Waveform Design Based on Sub-pulse Hybrid Modulation
Published 2025-08-01“…To address the low data rate issue in the design of Dual-Function Radar-Communication (DFRC) waveforms with radar detection as the primary function, this paper proposes an information modulation method for multiple sub-pulse structure waveforms called Sub-pulse Hybrid Modulation (SHM). …”
Get full text
Article -
428
Finite mixtures of functional graphical models: Uncovering heterogeneous dependencies in high-dimensional data.
Published 2025-01-01“…In this work, we propose finite mixtures of functional graphical models (MFGM), which detect the heterogeneous subgroups of the population and estimate single graph for each subgroup by considering the correlation structures. …”
Get full text
Article -
429
Multimodal imaging analysis and structure-function correlation in patients exposed to pentosan polysulfate sodium
Published 2025-07-01“…Purpose: To study the anatomic and functional retinal changes in patients exposed to pentosan polysulfate (PPS) using multimodal imaging and mesopic microperimetry. …”
Get full text
Article -
430
Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction
Published 2016-01-01“…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
Get full text
Article -
431
FCMI-YOLO: An efficient deep learning-based algorithm for real-time fire detection on edge devices.
Published 2025-01-01“…The rapid development of Internet of Things (IoT) technology and deep learning has propelled the deployment of vision-based fire detection algorithms on edge devices, significantly exacerbating the trade-off between accuracy and inference speed under hardware resource constraints. …”
Get full text
Article -
432
Multivariate GWAS analysis reveals loci associated with liver functions in continental African populations.
Published 2023-01-01“…<h4>Conclusions</h4>Using multivariate GWAS method improves the power to detect novel genotype-phenotype associations for liver functions not found with the standard univariate GWAS in the same dataset.…”
Get full text
Article -
433
-
434
Detection of VOCs and Biogenic Amines Through Luminescent Zn–Salen Complex-Tethered Pyrenyl Arms
Published 2024-12-01“…Biogenic amines, resulting from the natural decarboxylation of amino acids, are released into the environment from both natural and industrial sources. Several methods have been developed so far to detect amines in the environment. …”
Get full text
Article -
435
Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies
Published 2025-01-01“…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
Get full text
Article -
436
-
437
Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data
Published 2025-05-01“…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
Get full text
Article -
438
-
439
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
440
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article