Showing 41 - 60 results of 993 for search 'Resources detection function', query time: 0.15s Refine Results
  1. 41

    SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments by Xiangqian Huang, Xiaoming Li, Limengzi Yuan, Zhao Jiang, Hongwei Jin, Wanghao Wu, Ru Cai, Meilian Zheng, Hongpeng Bai

    Published 2025-01-01
    “…These results indicate that SDES-YOLO successfully combines efficiency and precision in fall detection. Through these innovations, SDES-YOLO not only improves detection accuracy but also optimizes computational efficiency, making it effective even in resource-constrained environments.…”
    Get full text
    Article
  2. 42
  3. 43
  4. 44

    KronNet a lightweight Kronecker enhanced feed forward neural network for efficient IoT intrusion detection by Saeed Ullah, Junsheng Wu, Mian Muhammad Kamal, Abdul Khader Jilani Saudagar

    Published 2025-07-01
    “…Abstract The rapid expansion of Internet of Things (IoT) networks necessitates efficient intrusion detection systems (IDS) capable of operating within the stringent resource constraints of IoT devices. …”
    Get full text
    Article
  5. 45
  6. 46

    Western spotted skunk spatial ecology in the temperate rainforests of the Pacific Northwest by Marie I. Tosa, Damon B. Lesmeister, Taal Levi

    Published 2024-08-01
    “…Using these home ranges, we fitted a resource selection function using environmental covariates that we assigned to various hypotheses such as resources, predator avoidance, thermal tolerance, and disturbance. …”
    Get full text
    Article
  7. 47

    Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning by Weijia Li, Jinhua Yu, Dairong Chen, Yi Lin, Runmin Dong, Xiang Zhang, Conghui He, Haohuan Fu

    Published 2025-03-01
    “…In the second stage, to further optimize the pseudo-labels, we effectively utilize the geometric spatial relationships between GIS map data and panoramic street-view images, integrating the building function information with facade detection results. …”
    Get full text
    Article
  8. 48

    Using an ensemble approach to predict habitat of Dusky Grouse ( Dendragapus obscurus ) in Montana, USA by Elizabeth A Leipold, Claire N Gower, Lance McNew

    Published 2024-12-01
    “…Consensus between the resource selection function and random forest models was high (93%) and the ensemble map had higher predictive accuracy when classifying the independent dataset than the other two models. …”
    Get full text
    Article
  9. 49

    Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility by Zhuqi Li, Wangyu Wu, Bingcai Wei, Hao Li, Jingbo Zhan, Songtao Deng, Jian Wang

    Published 2025-04-01
    “…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
    Get full text
    Article
  10. 50

    A review on WSN based resource constrained smart IoT systems by Shreeram Hudda, K. Haribabu

    Published 2025-05-01
    “…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
    Get full text
    Article
  11. 51

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
    Get full text
    Article
  12. 52

    A lightweight framework to secure IoT devices with limited resources in cloud environments by Vivek Kumar Pandey, Dinesh Sahu, Shiv Prakash, Rajkumar Singh Rathore, Pratibha Dixit, Iryna Hunko

    Published 2025-07-01
    “…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
    Get full text
    Article
  13. 53
  14. 54

    Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information by Raik Kuhlisch

    Published 2017-07-01
    “…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
    Get full text
    Article
  15. 55

    Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions by Jan Berghöfer, Nadia Khaveh, Stefan Mundlos, Julia Metzger

    Published 2025-03-01
    “…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
    Get full text
    Article
  16. 56
  17. 57

    Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets by Muhammad Zeeshan, Qaiser Riaz, Muhammad Ahmad Bilal, Muhammad K. Shahzad, Hajira Jabeen, Syed Ali Haider, Azizur Rahim

    Published 2022-01-01
    “…As this technology advances further, the need to exploit detection and weakness awareness increases to prevent unauthorized access to critical resources and business functions, thereby rendering the system unavailable. …”
    Get full text
    Article
  18. 58

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…The proposed system is formulated as a Markov Decision Process (MDP), where encryption level selection is driven by a reward function that optimizes the trade-off between energy efficiency and security robustness. …”
    Get full text
    Article
  19. 59

    A Comprehensive Resource for Exploring Antiphage Defense: DefenseFinder Webservice,Wiki and Databases by Tesson, Florian, Planel, Rémi, Egorov, Artyom A, Georjon, Héloïse, Vaysset, Hugo, Brancotte, Bryan, Néron, Bertrand, Mordret, Ernest, Atkinson, Gemma Catherine, Bernheim, Aude, Cury, Jean

    Published 2024-09-01
    “…To overcome these challenges, we present a hub of resources on defense systems, including: 1) an updated version of DefenseFinder with a web-service search function, 2) a community-curated repository of knowledge on the systems, and 3) precomputed databases, which include annotations done on RefSeq genomes and structure predictions generated by AlphaFold. …”
    Get full text
    Article
  20. 60