Suggested Topics within your search.
Suggested Topics within your search.
-
601
Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors
Published 2024-12-01“…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
Get full text
Article -
602
The Process of Using Power Supply Technical Solutions for Electronic Security Systems Operated in Smart Buildings: Modelling, Simulation and Reliability Analysis
Published 2024-12-01“…The operational tasks of ESSs in SBs require a continuous power supply from various sources, including renewable energy sources. The authors conducted an analysis of the power supply for selected ESSs used in SBs, which enabled the development of a power supply model. …”
Get full text
Article -
603
Forecasting springtime rainfall in southeastern Australia using empirical orthogonal functions and neural networks
Published 2025-08-01“…In addition to standard ocean climate indicators such as El Niño or the Indian Ocean Dipole, other typical patterns of variation are captured in terms of the temperatures of selected ocean areas. When characteristic patterns of correlation are discovered, they are included in the predictor selection in the form of expansion in terms of the empirical orthogonal functions (EOFs). …”
Get full text
Article -
604
The Artificial Intelligence-Enhanced Echocardiographic Detection of Congenital Heart Defects in the Fetus: A Mini-Review
Published 2025-03-01“…We envision that, through the combination of tele-echocardiography and AI, low-resource medical facilities may gain access to the effective detection of CHD at the prenatal stage.…”
Get full text
Article -
605
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM
Published 2025-02-01“…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
Get full text
Article -
606
Detection of VOCs and Biogenic Amines Through Luminescent Zn–Salen Complex-Tethered Pyrenyl Arms
Published 2024-12-01“…Fluorescence titrations and density functional theory (DFT) calculations reveal and explain the high binding affinity of this receptor toward selected amines, demonstrating its potential as an effective tool for amine detection.…”
Get full text
Article -
607
Brain tumor detection through image fusion using whale optimization and edge preserving filter
Published 2025-03-01Get full text
Article -
608
-
609
Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading
Published 2021-08-01“…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
Get full text
Article -
610
Energy-Efficiency using Critical Nodes Detection Problem in Industrial Wireless Sensor Networks (IWSNs)
Published 2025-03-01“…Experiments simulation validates our proposed approach, approving its efficiency in reducing significant energy consumption while preserving connectivity and functionality for industrial systems. Furthermore, the results highlight the potential of using critical node analysis to support sustainable and efficient operations in resource-constrained industrial environments. …”
Get full text
Article -
611
Statistically Optimized Near-Field Acoustic Holography Using Prolate Spheroidal Wave Functions
Published 2023-01-01“…Near-field acoustic holography (NAH) is an effective tool for realizing accurate sound field reconstruction in three-dimensional space on the prerequisite that appropriate elementary wave functions are selected or constructed to match the characteristics of the sound sources. …”
Get full text
Article -
612
SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr...
Published 2025-01-01“…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
Get full text
Article -
613
Machine learning-based model for acute asthma exacerbation detection using routine blood parameters
Published 2025-07-01“…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
Get full text
Article -
614
YOLO11m-SCFPose: An Improved Detection Framework for Keypoint Extraction in Cucumber Fruit Phenotyping
Published 2025-07-01“…The Focaler-IoU loss function is employed to improve keypoint localization accuracy. …”
Get full text
Article -
615
Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms
Published 2024-01-01“…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
Get full text
Article -
616
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
Get full text
Article -
617
Beach volleyball athlete training trends of Russian-language scientific resources: a systematic review
Published 2021-10-01Get full text
Article -
618
Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture
Published 2025-01-01“…The model’s performance was compared with other methods evaluated on the DFDC dataset, highlighting its efficiency in resource utilization and overall effectiveness. The findings reveal that the proposed QTL-CaiT-based system provides a strong foundation for deepfake detection and contributes significantly to the academic literature. …”
Get full text
Article -
619
Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability
Published 2025-05-01“…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
Get full text
Article -
620
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article