Showing 421 - 440 results of 1,810 for search '((\ sources detection functions\ ) OR (( resources OR resources) detection function\ ))', query time: 0.23s Refine Results
  1. 421

    From fish to fiber: 3D-nanoprinted optical neuromast for multi-integrated underwater detection by Liangye Li, Xuhao Fan, Geng Chen, Yueqi Liu, Fujun Zhang, Zhuolin Chen, Zhi Zhang, Wangyang Xu, Shixiong Zhang, Yuncheng Liu, Zongjing Li, Hui Gao, Zhijun Yan, Wei Xiong, Qizhen Sun

    Published 2025-08-01
    “…Abstract Fish possess high sensitivity to acoustic, vibrational, and hydrodynamic stimuli through unique sensing cells, providing unparalleled paradigms for developing underwater detection methods. However, artificial perception devices face challenges in replicating comparable sensitivity and multi-dimensional integration of fish in function and scale. …”
    Get full text
    Article
  2. 422

    Machine learning-based model for acute asthma exacerbation detection using routine blood parameters by Youpeng Chen, Junquan Sun, Yabang Chen, Enzhong Li, Jiancai Lu, Huanhua Tang, Yifei Xie, Jiana Zhang, Lesi Peng, Haojie Wu, Zhangkai J. Cheng, Baoqing Sun

    Published 2025-07-01
    “…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
    Get full text
    Article
  3. 423

    A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM by Shuroog Alsaleh, Mohamed El Bachir Menai, Saad Al-Ahmadi

    Published 2025-02-01
    “…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
    Get full text
    Article
  4. 424
  5. 425
  6. 426

    Enhancing Human Detection in Occlusion-Heavy Disaster Scenarios: A Visibility-Enhanced DINO (VE-DINO) Model with Reassembled Occlusion Dataset by Zi-An Zhao, Shidan Wang, Min-Xin Chen, Ye-Jiao Mao, Andy Chi-Ho Chan, Derek Ka-Hei Lai, Duo Wai-Chi Wong, James Chung-Wai Cheung

    Published 2025-01-01
    “…VE-DINO enhances detection accuracy by incorporating body part key point information and employing a specialized loss function. …”
    Get full text
    Article
  7. 427
  8. 428

    Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region by Beijing XIE, Heng LI, Zheng LUAN, Zhen LEI, Xiaoxu LI, Zhuo LI

    Published 2025-02-01
    “…Compared to various lightweight architectures and advanced detection models, this method demonstrates excellent accuracy, lower computational costs, and better real-time performance, providing a feasible coal mine pedestrian-vehicle detection method for resource-constrained coal mine scenarios, meeting the deployment requirements of coal mine video surveillance and enabling real-time alerts for intelligent inspection of coal mine pedestrian-vehicles.…”
    Get full text
    Article
  9. 429
  10. 430

    Finite mixtures of functional graphical models: Uncovering heterogeneous dependencies in high-dimensional data. by Qihai Liu, Kevin H Lee, Hyun Bin Kang

    Published 2025-01-01
    “…In this work, we propose finite mixtures of functional graphical models (MFGM), which detect the heterogeneous subgroups of the population and estimate single graph for each subgroup by considering the correlation structures. …”
    Get full text
    Article
  11. 431

    Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors by ZHANG Wei, YANG Qiu, LI Hao

    Published 2024-12-01
    “…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
    Get full text
    Article
  12. 432
  13. 433
  14. 434

    Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms by Jinmo Yang, R. Young Chul Kim

    Published 2024-01-01
    “…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
    Get full text
    Article
  15. 435

    F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection by Muhammad Rashid Minhas, Qaisar M. Shafi, Shoab Ahmed Khan, Tahir Ahmad, Subhan Ullah, Attaullah Buriro, Muhammad Azfar Yaqub

    Published 2025-01-01
    “…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
    Get full text
    Article
  16. 436

    Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning by Ali Altalbe

    Published 2024-01-01
    “…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
    Get full text
    Article
  17. 437
  18. 438
  19. 439

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  20. 440

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article