-
41
Analysis of Facial Cues for Cognitive Decline Detection Using In-the-Wild Data
Published 2025-06-01“…Video-based analysis offers a promising, low-cost alternative to resource-intensive clinical assessments. This paper investigates visual features (eye blink rate (EBR), head turn rate (HTR), and head movement statistical features (HMSFs)) for distinguishing between neurodegenerative disorders (NDs), mild cognitive impairment (MCI), functional memory disorders (FMDs), and healthy controls (HCs). …”
Get full text
Article -
42
-
43
SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments
Published 2025-01-01“…These results indicate that SDES-YOLO successfully combines efficiency and precision in fall detection. Through these innovations, SDES-YOLO not only improves detection accuracy but also optimizes computational efficiency, making it effective even in resource-constrained environments.…”
Get full text
Article -
44
Remote Sensing Image Detection Method Combining Dynamic Convolution and Attention Mechanism
Published 2025-01-01Get full text
Article -
45
Evaluation of Intrusion Detection Systems in Cyber Security using Fuzzy OffLogic and MCDM Approach
Published 2025-06-01Get full text
Article -
46
-
47
Nanotechnologies associated to floral resources in agri-food sector
Published 2018-01-01Get full text
Article -
48
Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning
Published 2025-03-01“…In the second stage, to further optimize the pseudo-labels, we effectively utilize the geometric spatial relationships between GIS map data and panoramic street-view images, integrating the building function information with facade detection results. …”
Get full text
Article -
49
Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
Published 2025-03-01“…The proposed system is formulated as a Markov Decision Process (MDP), where encryption level selection is driven by a reward function that optimizes the trade-off between energy efficiency and security robustness. …”
Get full text
Article -
50
Productivity, activity of digestive and antioxidant enzymes of carp (Cyprinus carpio Linnaeus, 1758) as a result of the use of inulin in low-nutrient feeds
Published 2025-06-01“…Based on a comprehensive analysis of the productive parameters and functional state of the carp body, the prospects for the use of the prebiotic inulin in low-nutrient feeds were investigated for the first time. …”
Get full text
Article -
51
Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility
Published 2025-04-01“…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
Get full text
Article -
52
A review on WSN based resource constrained smart IoT systems
Published 2025-05-01“…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
Get full text
Article -
53
Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm
Published 2025-01-01“…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
Get full text
Article -
54
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
Get full text
Article -
55
Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions
Published 2025-03-01“…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
Get full text
Article -
56
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01“…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
Get full text
Article -
57
-
58
-
59
A Comprehensive Resource for Exploring Antiphage Defense: DefenseFinder Webservice,Wiki and Databases
Published 2024-09-01“…To overcome these challenges, we present a hub of resources on defense systems, including: 1) an updated version of DefenseFinder with a web-service search function, 2) a community-curated repository of knowledge on the systems, and 3) precomputed databases, which include annotations done on RefSeq genomes and structure predictions generated by AlphaFold. …”
Get full text
Article -
60
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01“…As this technology advances further, the need to exploit detection and weakness awareness increases to prevent unauthorized access to critical resources and business functions, thereby rendering the system unavailable. …”
Get full text
Article