Showing 441 - 460 results of 2,295 for search '((\ sources selection function\ ) OR (( resources OR resources) detection functions\ ))', query time: 0.29s Refine Results
  1. 441

    Securing Wireless Communications with Energy Harvesting and Multi-antenna Diversity by Nguyen Quang Sang, tran Cong Hung, tran Trung Duy, minh Tran, byung Seo Kim

    Published 2025-04-01
    “…Analytical expressions for the Signal-to-Noise Ratios (SNRs) at both the destination D and the eavesdropper E are derived, along with the Probability Density Function (PDF) and Cumulative Distribution Function (CDF) of these SNRs under block Rayleigh fading conditions. …”
    Get full text
    Article
  2. 442
  3. 443

    Uncovering functional deterioration in the rhizosphere microbiome associated with post-green revolution wheat cultivars by Monique E. Smith, Vanessa N. Kavamura, David Hughes, Rodrigo Mendes, George Lund, Ian Clark, Tim H. Mauchline

    Published 2025-06-01
    “…Of the 113 functional genes that were differentially abundant between heritage and modern cultivars, 95% were depleted in modern cultivars and 65% of differentially abundant reads best mapped to genes involved in staurosporine biosynthesis (antibiotic product), plant cell wall degradation (microbial mediation of plant root architecture, overwintering energy source for microbes) and sphingolipid metabolism (signal bioactive molecules). …”
    Get full text
    Article
  4. 444

    IMPLEMENTATION OF LEARNING MANAGEMENT SYSTEMS WITH GENERATIVE ARTIFICIAL INTELLIGENCE FUNCTIONS IN THE POST-PANDEMIC ENVIRONMENT by Denis-Cătălin Arghir

    Published 2024-04-01
    “…The system goes beyond traditional LMS functionalities by providing suggestions to enhance and diversify lessons. …”
    Get full text
    Article
  5. 445

    Antimicrobial Activity of Chitosan from Different Sources Against Non-<i>Saccharomyces</i> Wine Yeasts as a Tool for Producing Low-Sulphite Wine by Francesco Tedesco, Rocchina Pietrafesa, Gabriella Siesto, Carmen Scieuzo, Rosanna Salvia, Patrizia Falabella, Angela Capece

    Published 2024-10-01
    “…Finally, the efficiency of different antimicrobial treatments was evaluated during laboratory-scale fermentations inoculated with a selected <i>S. cerevisiae</i> strain. The tested strains exhibited medium/high resistance to the chitosan; in some cases, the behaviour varied in the function of species/strain, and only four strains exhibited different resistance levels, depending on the chitosan source. …”
    Get full text
    Article
  6. 446

    Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China by Bingkun Wang, Zhiyuan Liu, Jiangbo Xi, Siyan Gao, Ming Cong, Haixing Shang

    Published 2025-05-01
    “…The large-scale detection of greenhouses and rural buildings is important for natural resource surveys and farmland protection. …”
    Get full text
    Article
  7. 447

    The Artificial Intelligence-Enhanced Echocardiographic Detection of Congenital Heart Defects in the Fetus: A Mini-Review by Khadiza Tun Suha, Hugh Lubenow, Stefania Soria-Zurita, Marcus Haw, Joseph Vettukattil, Jingfeng Jiang

    Published 2025-03-01
    “…We envision that, through the combination of tele-echocardiography and AI, low-resource medical facilities may gain access to the effective detection of CHD at the prenatal stage.…”
    Get full text
    Article
  8. 448

    Machine learning-based model for acute asthma exacerbation detection using routine blood parameters by Youpeng Chen, Junquan Sun, Yabang Chen, Enzhong Li, Jiancai Lu, Huanhua Tang, Yifei Xie, Jiana Zhang, Lesi Peng, Haojie Wu, Zhangkai J. Cheng, Baoqing Sun

    Published 2025-07-01
    “…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
    Get full text
    Article
  9. 449

    YOLO11m-SCFPose: An Improved Detection Framework for Keypoint Extraction in Cucumber Fruit Phenotyping by Huijiao Yu, Xuehui Zhang, Jun Yan, Xianyong Meng

    Published 2025-07-01
    “…The Focaler-IoU loss function is employed to improve keypoint localization accuracy. …”
    Get full text
    Article
  10. 450

    From fish to fiber: 3D-nanoprinted optical neuromast for multi-integrated underwater detection by Liangye Li, Xuhao Fan, Geng Chen, Yueqi Liu, Fujun Zhang, Zhuolin Chen, Zhi Zhang, Wangyang Xu, Shixiong Zhang, Yuncheng Liu, Zongjing Li, Hui Gao, Zhijun Yan, Wei Xiong, Qizhen Sun

    Published 2025-08-01
    “…Abstract Fish possess high sensitivity to acoustic, vibrational, and hydrodynamic stimuli through unique sensing cells, providing unparalleled paradigms for developing underwater detection methods. However, artificial perception devices face challenges in replicating comparable sensitivity and multi-dimensional integration of fish in function and scale. …”
    Get full text
    Article
  11. 451
  12. 452

    Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms by Jinmo Yang, R. Young Chul Kim

    Published 2024-01-01
    “…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
    Get full text
    Article
  13. 453

    Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture by Bekir Eray Katı, Ecir Uğur Küçüksille, Güncel Sarıman

    Published 2025-01-01
    “…The model’s performance was compared with other methods evaluated on the DFDC dataset, highlighting its efficiency in resource utilization and overall effectiveness. The findings reveal that the proposed QTL-CaiT-based system provides a strong foundation for deepfake detection and contributes significantly to the academic literature. …”
    Get full text
    Article
  14. 454

    F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection by Muhammad Rashid Minhas, Qaisar M. Shafi, Shoab Ahmed Khan, Tahir Ahmad, Subhan Ullah, Attaullah Buriro, Muhammad Azfar Yaqub

    Published 2025-01-01
    “…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
    Get full text
    Article
  15. 455

    Automated Artery Detection and Stenosis Classification in CTA Using Deep Learning for Peripheral Arterial Disease by Ali M. O. A. Anwer, Hacer Karacan, Muhammed Rabee, Levent Enver, Gonca Cabuk

    Published 2025-01-01
    “…We use Faster R-CNN with a ResNet-101 backbone driven by a custom loss function to achieve good artery localization and reduce false positives. …”
    Get full text
    Article
  16. 456
  17. 457

    AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11. by Rui He, Dezhi Han, Xiang Shen, Bing Han, Zhongdai Wu, Xiaohu Huang

    Published 2025-01-01
    “…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
    Get full text
    Article
  18. 458

    GastroEndoNet: Comprehensive endoscopy image dataset for GERD and polyp detectionMendeley Data by Abu Kowshir Bitto, Md. Hasan Imam Bijoy, Kamrul Hassan Shakil, Aka Das, Khalid Been Badruzzaman Biplob, Imran Mahmud, Syed Md. Minhaz Hossain

    Published 2025-06-01
    “…It provides an invaluable resource for developing machine learning models aimed at the automatic diagnosis, classification, and detection of GERD and polyps, potentially improving the speed and accuracy of clinical decision-making. …”
    Get full text
    Article
  19. 459
  20. 460

    A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM by Shuroog Alsaleh, Mohamed El Bachir Menai, Saad Al-Ahmadi

    Published 2025-02-01
    “…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
    Get full text
    Article