Search alternatives:
resource » source (Expand Search)
Showing 241 - 260 results of 2,992 for search '((\ sources selection function\ ) OR (( (sources OR sources) OR resource) detection functions\ ))', query time: 0.35s Refine Results
  1. 241
  2. 242
  3. 243

    SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments by Xiangqian Huang, Xiaoming Li, Limengzi Yuan, Zhao Jiang, Hongwei Jin, Wanghao Wu, Ru Cai, Meilian Zheng, Hongpeng Bai

    Published 2025-01-01
    “…These results indicate that SDES-YOLO successfully combines efficiency and precision in fall detection. Through these innovations, SDES-YOLO not only improves detection accuracy but also optimizes computational efficiency, making it effective even in resource-constrained environments.…”
    Get full text
    Article
  4. 244

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…The proposed model leverages a deep learning-based anomaly detection system to classify network states into low, moderate, or high threat levels, which guides encryption policy selection. …”
    Get full text
    Article
  5. 245

    Quality assessment of garden strawberries of foreign selection by I. M. Novikova, O. M. Blinnikova, A. S. Ilyinsky

    Published 2024-04-01
    “…At the same time, the need to use domestically produced raw materials, as well as functional ingredients from these raw materials in the production of a wide range of products for healthy and preventive nutrition, is clear lystated. …”
    Get full text
    Article
  6. 246
  7. 247

    Non-Line-of-Sight Location With Gauss Filtering Algorithm Based on a Model of Photon Flight by Yu Ren, Zongliang Xie, Yihan Luo, Shaoxiong Xu, Haotong Ma, Yi Tan

    Published 2020-01-01
    “…Recently, non-line-of-sight (NLOS) detection based on time of flight (TOF) has been investigated. …”
    Get full text
    Article
  8. 248

    Productivity, activity of digestive and antioxidant enzymes of carp (Cyprinus carpio Linnaeus, 1758) as a result of the use of inulin in low-nutrient feeds by O. Deren, O. Dobrianska, M. Koryliak

    Published 2025-06-01
    “…The practical use of the knowledge gained outlines the possibility of optimizing the production of fish when introducing resource-saving technologies in aquaculture.…”
    Get full text
    Article
  9. 249
  10. 250
  11. 251
  12. 252
  13. 253

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
    Get full text
    Article
  14. 254

    A review on WSN based resource constrained smart IoT systems by Shreeram Hudda, K. Haribabu

    Published 2025-05-01
    “…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
    Get full text
    Article
  15. 255
  16. 256

    Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility by Zhuqi Li, Wangyu Wu, Bingcai Wei, Hao Li, Jingbo Zhan, Songtao Deng, Jian Wang

    Published 2025-04-01
    “…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
    Get full text
    Article
  17. 257

    An Embodied Intelligence System for Coal Mine Safety Assessment Based on Multi-Level Large Language Models by Yi Sun, Faxiu Ji

    Published 2025-01-01
    “…By leveraging the tool invocation and reasoning capabilities of LLM in conjunction with a coal mine safety knowledge base, the system achieves logical inference, anomalous data detection, and potential safety risk prediction. Furthermore, its memory functionality ensures the learning and utilization of historical experiences, providing a solid foundation for continuous assessment processes. …”
    Get full text
    Article
  18. 258

    The Impact of Differences in Renovation Models of Abandoned Boiler Rooms on Community Vitality—A Case Study of Shenyang, China by Lei Chen, Yahang Cheng, Zixi Zhou, Yibo Wen

    Published 2025-05-01
    “…Unlike prior studies that rely on single data sources or unidimensional metrics, our multi-source approach enhances spatiotemporal resolution, improves the accuracy of subjective perceptions, and enables cross-validation between objective behavioral trajectories and residents’ self-reports, thereby significantly strengthening the comprehensiveness and reliability of community vitality measurement. …”
    Get full text
    Article
  19. 259

    Biomimetic Microfluidic Pumps for Selective Oil–Water Separation by Zhaolong Wang, Yinfeng Li, Mingzhu Xie, Ziheng Zhan, Wenhao Li, Qihui Xie, Yong Shuai, Zhichao Dong, Zuankai Wang

    Published 2025-07-01
    “…The findings underscore the potential of 3D bionic functional spring microchannels for selectively separating a wide range of oil‐water mixtures with exceptional efficiency.…”
    Get full text
    Article
  20. 260

    Optimum Arrangement of Reactive Power Sources While Using Genetic Algori by A. M. Gashimov, R. N. Rakhmanov, S. T. Rakhmanov

    Published 2010-02-01
    “…This objective can be achieved by optimum distribution of reactive power sources in proper places of distribution electricity supply network. …”
    Get full text
    Article