-
481
Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks
Published 2025-07-01“…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
Get full text
Article -
482
Fuzzy deep learning architecture for cucumber plant disease detection and classification
Published 2025-05-01“…The proposed approach is efficient and feasible, offering a more stable and accurate disease detection system while utilizing fewer resources. This work demonstrates the potential of AI-driven solutions in agriculture, particularly in improving disease detection and crop yield through advanced machine learning techniques.…”
Get full text
Article -
483
Ultra-sensitive terahertz photonic crystal fiber sensor for detection of tuberculosis
Published 2025-06-01“…This sensing unit under consideration can function within the terahertz frequency range. Consequently, it serves as a valuable resource for healthcare providers, enhancing their diagnostic capabilities for prompt treatment and improved patient outcomes. …”
Get full text
Article -
484
Pavement Disease Visual Detection by Structure Perception and Feature Attention Network
Published 2025-01-01“…Balancing detection performance and computational efficiency is critical for sustainable pavement disease detection in energy-constrained scenarios. …”
Get full text
Article -
485
LiteTom-RTDETR: A Lightweight Real-Time Tomato Detection System for Plant Factories
Published 2025-06-01“…The accuracy and speed of tomato detection were increased to facilitate fully automated harvesting by improving the Real-Time Detection Transformer (RTDETR) to develop a new lightweight tomato detection model called LiteTom-RTDETR. …”
Get full text
Article -
486
Plug-and-Play Robust Aerial Object Detection Under Hazy Conditions
Published 2024-01-01“…Moreover, we also propose a detection feature pyramid loss function to more accurately restore object features. …”
Get full text
Article -
487
DEM-based topographic change detection considering the spatial distribution of errors
Published 2025-03-01Get full text
Article -
488
A Universal Tire Detection Method Based on Improved YOLOv8
Published 2024-01-01“…However, traditional methods of tire defect detection have encountered problems such as slow detection speed, complex tire defect backgrounds, and limited hardware resources. …”
Get full text
Article -
489
Lightweight obstacle detection for unmanned mining trucks in open-pit mines
Published 2025-03-01“…In addition, this paper also adopts the amplitude-based layer adaptive sparse pruning algorithm (LAMP) to further compress the model size while maintaining efficient detection performance. Through this pruning strategy, the model further reduces its dependence on computing resources while maintaining key performance. …”
Get full text
Article -
490
Optimization of train obstacle detection based on zone media controller unit
Published 2024-11-01“…In addition, the need for comprehensive train detection including pantograph-catenary systems and running gears, lead to an increased number of on-board devices, resulting in fewer computational resources available for each detection system, and complicating equipment installation and maintenance. …”
Get full text
Article -
491
A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone
Published 2024-08-01“…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
Get full text
Article -
492
Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning
Published 2025-01-01“…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as “black boxes” that limit their practical utility. …”
Get full text
Article -
493
Identification, functional analysis, and clinical applications of defective viral genomes
Published 2025-07-01Get full text
Article -
494
Discrimination of mercury, cadmium and lead polluted rice leaves based on near infrared spectroscopy technology
Published 2013-01-01“…There are hundreds of sources of heavy metal pollution, including the industries of coal, natural gas, paper, and mining. …”
Get full text
Article -
495
TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code
Published 2025-01-01“…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
Get full text
Article -
496
A review of deep learning models to detect malware in Android applications
Published 2023-12-01“…Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions. …”
Get full text
Article -
497
Myoglobin expression improves T-cell metabolism and antitumor effector function
Published 2025-06-01“…Although T cells expressing Mb exhibited increased expression of effector cytokines, PD-1 was still detected and targetable by anti-PD-1 monoclonal antibodies, which in combination with transfer of Mb-expressing T cells demonstrated maximal efficacy in delaying tumor growth.Conclusion Taken together, we show that expression of Mb in T cells can increase their metabolism, infiltration into the tumor tissue, and effector function against cancer cells.…”
Get full text
Article -
498
Multi task detection method for operating status of belt conveyor based on DR-YOLOM
Published 2025-06-01“…A single network is used to simultaneously recognize large-sized coal blocks, detect belt edges, and detect coal flow status. Compared with using a separate model for each task, integrating three different necks and heads into a model with a shared backbone can save a lot of computing resources and inference time. …”
Get full text
Article -
499
-
500