Search alternatives:
resource » source (Expand Search)
Showing 41 - 60 results of 993 for search 'Resource detection function', query time: 0.15s Refine Results
  1. 41

    Analysis of Facial Cues for Cognitive Decline Detection Using In-the-Wild Data by Fatimah Alzahrani, Steve Maddock, Heidi Christensen

    Published 2025-06-01
    “…Video-based analysis offers a promising, low-cost alternative to resource-intensive clinical assessments. This paper investigates visual features (eye blink rate (EBR), head turn rate (HTR), and head movement statistical features (HMSFs)) for distinguishing between neurodegenerative disorders (NDs), mild cognitive impairment (MCI), functional memory disorders (FMDs), and healthy controls (HCs). …”
    Get full text
    Article
  2. 42
  3. 43

    SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments by Xiangqian Huang, Xiaoming Li, Limengzi Yuan, Zhao Jiang, Hongwei Jin, Wanghao Wu, Ru Cai, Meilian Zheng, Hongpeng Bai

    Published 2025-01-01
    “…These results indicate that SDES-YOLO successfully combines efficiency and precision in fall detection. Through these innovations, SDES-YOLO not only improves detection accuracy but also optimizes computational efficiency, making it effective even in resource-constrained environments.…”
    Get full text
    Article
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48

    Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning by Weijia Li, Jinhua Yu, Dairong Chen, Yi Lin, Runmin Dong, Xiang Zhang, Conghui He, Haohuan Fu

    Published 2025-03-01
    “…In the second stage, to further optimize the pseudo-labels, we effectively utilize the geometric spatial relationships between GIS map data and panoramic street-view images, integrating the building function information with facade detection results. …”
    Get full text
    Article
  9. 49

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…The proposed system is formulated as a Markov Decision Process (MDP), where encryption level selection is driven by a reward function that optimizes the trade-off between energy efficiency and security robustness. …”
    Get full text
    Article
  10. 50

    Productivity, activity of digestive and antioxidant enzymes of carp (Cyprinus carpio Linnaeus, 1758) as a result of the use of inulin in low-nutrient feeds by O. Deren, O. Dobrianska, M. Koryliak

    Published 2025-06-01
    “…Based on a comprehensive ana­lysis of the productive parameters and functional state of the carp body, the prospects for the use of the prebiotic inulin in low-nutrient feeds were investigated for the first time. …”
    Get full text
    Article
  11. 51

    Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility by Zhuqi Li, Wangyu Wu, Bingcai Wei, Hao Li, Jingbo Zhan, Songtao Deng, Jian Wang

    Published 2025-04-01
    “…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
    Get full text
    Article
  12. 52

    A review on WSN based resource constrained smart IoT systems by Shreeram Hudda, K. Haribabu

    Published 2025-05-01
    “…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
    Get full text
    Article
  13. 53

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
    Get full text
    Article
  14. 54

    A lightweight framework to secure IoT devices with limited resources in cloud environments by Vivek Kumar Pandey, Dinesh Sahu, Shiv Prakash, Rajkumar Singh Rathore, Pratibha Dixit, Iryna Hunko

    Published 2025-07-01
    “…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
    Get full text
    Article
  15. 55

    Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions by Jan Berghöfer, Nadia Khaveh, Stefan Mundlos, Julia Metzger

    Published 2025-03-01
    “…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
    Get full text
    Article
  16. 56

    Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information by Raik Kuhlisch

    Published 2017-07-01
    “…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
    Get full text
    Article
  17. 57
  18. 58
  19. 59

    A Comprehensive Resource for Exploring Antiphage Defense: DefenseFinder Webservice,Wiki and Databases by Tesson, Florian, Planel, Rémi, Egorov, Artyom A, Georjon, Héloïse, Vaysset, Hugo, Brancotte, Bryan, Néron, Bertrand, Mordret, Ernest, Atkinson, Gemma Catherine, Bernheim, Aude, Cury, Jean

    Published 2024-09-01
    “…To overcome these challenges, we present a hub of resources on defense systems, including: 1) an updated version of DefenseFinder with a web-service search function, 2) a community-curated repository of knowledge on the systems, and 3) precomputed databases, which include annotations done on RefSeq genomes and structure predictions generated by AlphaFold. …”
    Get full text
    Article
  20. 60

    Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets by Muhammad Zeeshan, Qaiser Riaz, Muhammad Ahmad Bilal, Muhammad K. Shahzad, Hajira Jabeen, Syed Ali Haider, Azizur Rahim

    Published 2022-01-01
    “…As this technology advances further, the need to exploit detection and weakness awareness increases to prevent unauthorized access to critical resources and business functions, thereby rendering the system unavailable. …”
    Get full text
    Article