-
41
SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments
Published 2025-01-01“…These results indicate that SDES-YOLO successfully combines efficiency and precision in fall detection. Through these innovations, SDES-YOLO not only improves detection accuracy but also optimizes computational efficiency, making it effective even in resource-constrained environments.…”
Get full text
Article -
42
Evaluation of Intrusion Detection Systems in Cyber Security using Fuzzy OffLogic and MCDM Approach
Published 2025-06-01Get full text
Article -
43
-
44
KronNet a lightweight Kronecker enhanced feed forward neural network for efficient IoT intrusion detection
Published 2025-07-01“…Abstract The rapid expansion of Internet of Things (IoT) networks necessitates efficient intrusion detection systems (IDS) capable of operating within the stringent resource constraints of IoT devices. …”
Get full text
Article -
45
Nanotechnologies associated to floral resources in agri-food sector
Published 2018-01-01Get full text
Article -
46
Western spotted skunk spatial ecology in the temperate rainforests of the Pacific Northwest
Published 2024-08-01“…Using these home ranges, we fitted a resource selection function using environmental covariates that we assigned to various hypotheses such as resources, predator avoidance, thermal tolerance, and disturbance. …”
Get full text
Article -
47
Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning
Published 2025-03-01“…In the second stage, to further optimize the pseudo-labels, we effectively utilize the geometric spatial relationships between GIS map data and panoramic street-view images, integrating the building function information with facade detection results. …”
Get full text
Article -
48
Using an ensemble approach to predict habitat of Dusky Grouse ( Dendragapus obscurus ) in Montana, USA
Published 2024-12-01“…Consensus between the resource selection function and random forest models was high (93%) and the ensemble map had higher predictive accuracy when classifying the independent dataset than the other two models. …”
Get full text
Article -
49
Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility
Published 2025-04-01“…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
Get full text
Article -
50
A review on WSN based resource constrained smart IoT systems
Published 2025-05-01“…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
Get full text
Article -
51
Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm
Published 2025-01-01“…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
Get full text
Article -
52
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
Get full text
Article -
53
-
54
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01“…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
Get full text
Article -
55
Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions
Published 2025-03-01“…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
Get full text
Article -
56
-
57
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01“…As this technology advances further, the need to exploit detection and weakness awareness increases to prevent unauthorized access to critical resources and business functions, thereby rendering the system unavailable. …”
Get full text
Article -
58
Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
Published 2025-03-01“…The proposed system is formulated as a Markov Decision Process (MDP), where encryption level selection is driven by a reward function that optimizes the trade-off between energy efficiency and security robustness. …”
Get full text
Article -
59
A Comprehensive Resource for Exploring Antiphage Defense: DefenseFinder Webservice,Wiki and Databases
Published 2024-09-01“…To overcome these challenges, we present a hub of resources on defense systems, including: 1) an updated version of DefenseFinder with a web-service search function, 2) a community-curated repository of knowledge on the systems, and 3) precomputed databases, which include annotations done on RefSeq genomes and structure predictions generated by AlphaFold. …”
Get full text
Article -
60