Search alternatives:
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
-
481
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article -
482
SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr...
Published 2025-01-01“…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
Get full text
Article -
483
Modelling groundwater futures under climatic uncertainty for local policy and planning: A case of quantification of groundwater resources at sub-regional level in the Ganges basin
Published 2025-06-01“…This study looks at how future groundwater levels will be affected by climate change in relation to important functioning thresholds that are typical for aquifers that replenish periodically. …”
Get full text
Article -
484
Dual Function Radar and Communication Waveform Design Based on Sub-pulse Hybrid Modulation
Published 2025-08-01“…To address the low data rate issue in the design of Dual-Function Radar-Communication (DFRC) waveforms with radar detection as the primary function, this paper proposes an information modulation method for multiple sub-pulse structure waveforms called Sub-pulse Hybrid Modulation (SHM). …”
Get full text
Article -
485
Cross-Domain Communication Method Based on Load Balancing for SDNs
Published 2025-02-01“…Therefore, the multi-domain control plane needs to consider more network resource states during the path selection, such as link weights, load saturation, and resource occupancy rates, in order to select the optimal paths to maximize the satisfaction of data plane requirements while maintaining network load balance. …”
Get full text
Article -
486
A Surrogate Piecewise Linear Loss Function for Contextual Stochastic Linear Programs in Transport
Published 2025-06-01“…We test our method with a binary route selection task—the simplest setting to isolate and assess the impact of our modeling approach on decision quality. …”
Get full text
Article -
487
Cascaded Directional Coupler-Based Triplexer Working on Spectroscopically Relevant Wavelengths for Multiple Gas Detection
Published 2025-02-01“…The triplexer’s functions focus on enhancing the coupling efficiency and selectivity, while facilitating the on-chip integration of diode lasers. …”
Get full text
Article -
488
Harnessing Deep Learning With AlexNet for Tomato Leaf Disease Detection in the Indian Himalayan Terrain
Published 2025-01-01“…Agriculture is essential for living in the Indian Himalayan region (IHR), as it functions as the main occupation and source of income. …”
Get full text
Article -
489
-
490
CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8.
Published 2025-01-01“…The model achieves precision on par with existing mainstream algorithms, while being simpler, significantly reducing computational requirements, and being more suitable for small target detection tasks. The source code and test results of the models used in this study are available at https://github.com/lyzzzzyy/CSW-YOLO.git.…”
Get full text
Article -
491
Detection of VOCs and Biogenic Amines Through Luminescent Zn–Salen Complex-Tethered Pyrenyl Arms
Published 2024-12-01“…Biogenic amines, resulting from the natural decarboxylation of amino acids, are released into the environment from both natural and industrial sources. Several methods have been developed so far to detect amines in the environment. …”
Get full text
Article -
492
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
Get full text
Article -
493
Brain tumor detection through image fusion using whale optimization and edge preserving filter
Published 2025-03-01Get full text
Article -
494
Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies
Published 2025-01-01“…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
Get full text
Article -
495
SHIVA-CMB: a deep-learning-based robust cerebral microbleed segmentation tool trained on multi-source T2*GRE- and susceptibility-weighted MRI
Published 2024-12-01“…An increasing number of automated CMB detection methods being proposed are based on supervised deep learning (DL). …”
Get full text
Article -
496
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
Published 2022-04-01“…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
Get full text
Article -
497
A fuzzy method for improving the functionality of search engines based on user's web interactions
Published 2015-04-01Get full text
Article -
498
Finite mixtures of functional graphical models: Uncovering heterogeneous dependencies in high-dimensional data.
Published 2025-01-01“…In this work, we propose finite mixtures of functional graphical models (MFGM), which detect the heterogeneous subgroups of the population and estimate single graph for each subgroup by considering the correlation structures. …”
Get full text
Article -
499
Natural variation of ClCCT promoter promotes flowering and dwarfing in adlay (Coix lacryma-jobi L.)
Published 2025-06-01Get full text
Article -
500
Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors
Published 2024-12-01“…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
Get full text
Article