Search alternatives:
efficient » efficiency (Expand Search)
Showing 2,681 - 2,700 results of 5,656 for search 'complex (selection OR detection) efficient', query time: 0.24s Refine Results
  1. 2681
  2. 2682

    Mechanosynthesis and thermal bio–sensing of beryllium–based molecularly imprinted polymers by Ana I. Furtado, Joseph W. Lowdon, Kasper Eersels, Bart van Grinsven, Adriana Cruz, Jacinta Serpa, Vasco D.B. Bonifácio, Raquel Viveiros, Teresa Casimiro

    Published 2025-08-01
    “…Subsequently, supercritical CO2 (scCO2) technology was used for efficiently desorb of the template, yielding vacant receptors. …”
    Get full text
    Article
  3. 2683
  4. 2684

    An Organ-on-a-Chip Modular Platform with Integrated Immunobiosensors for Monitoring the Extracellular Environment by Anastasia Kanioura, Myrto Kyriaki Filippidou, Dimitra Tsounidi, Panagiota S. Petrou, Stavros Chatzandroulis, Angeliki Tserepi

    Published 2025-06-01
    “…Despite the potential of OoC technology in emulating tissue complexity, a significant gap persists in the continuous real-time monitoring of cellular behaviors and their responses to external stimuli, arising from the lack of biosensors integrated onto OoC microfluidic platforms. …”
    Get full text
    Article
  5. 2685

    Lightweight CNN-based seizure classification via leveraging chimera states in iEEG recordings by Fatemeh Azad, Saeed Bagheri Shouraki, Soheila Nazari, Mansun Chan

    Published 2025-09-01
    “…These states provide a potential tool for predicting and detecting epileptic seizures. Effective detection and classification of chimera states in intracranial electroencephalography (iEEG) signals are critical for improving patient outcomes and deepening our understanding of neurological disorders. …”
    Get full text
    Article
  6. 2686

    Accurate estimation of permeability reduction resulted from low salinity water flooding in clay-rich sandstones by Xiaojuan Zhang, Muntadher Abed Hussein, Tarak Vora, Anupam Yadav, Asha Rajiv, Aman Shankhyan, Sachin Jaidka, Mehul Manu, Farzona Alimova, Issa Mohammed Kadhim, Zainab Jamal Hamoodah, Fadhil Faez, Ahmad Khalid

    Published 2025-08-01
    “…Abstract Accurate estimation of permeability reduction in clay-rich sandstones during low-salinity water flooding is critical for optimizing enhanced oil recovery (EOR) strategies and ensuring efficient reservoir management. Traditional methods often rely on costly experiments or simplified empirical correlations, which struggle to capture the complex, non-linear interactions governing this phenomenon. …”
    Get full text
    Article
  7. 2687

    Direction-Aware Lightweight Framework for Traditional Mongolian Document Layout Analysis by Chenyang Zhou, Monghjaya Ha, Licheng Wu

    Published 2025-04-01
    “…Our framework introduces three key innovations: a modified MobileNetV3 backbone with asymmetric convolutions for efficient vertical feature extraction, a dynamic feature enhancement module with channel attention for adaptive multi-scale information fusion, and a direction-aware detection head with <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mo form="prefix">sin</mo><mi>θ</mi><mo>,</mo><mo form="prefix">cos</mo><mi>θ</mi><mo>)</mo></mrow></semantics></math></inline-formula> vector representation for accurate orientation modeling. …”
    Get full text
    Article
  8. 2688

    Plant recognition of maize seedling stage in UAV remote sensing images based on H-RT-DETR by Yunlong Wu, Shouqi Yuan, Lingdi Tang

    Published 2025-05-01
    “…In order to quickly and accurately identify and count maize seedlings in a complex field environment, this study proposes an end-to-end maize seedling plant detection model H-RT-DETR (Hierarchical-Real-Time DEtection TRansformer) based on hierarchical feature extraction and RT-DETR (Real-Time DEtection TRansformer). …”
    Get full text
    Article
  9. 2689

    Optimized AI and IoT-Driven Framework for Intelligent Water Resource Management by Mahmoud Badee Rokaya Mahmoud, Dalia Ismaeil Ibrahim Hemdan, Samah Hazzaa Alajmani, Raneem Yousif Alyami, Ghada Elmarhomy, Hassan Hashim, El-Sayed Atlam

    Published 2025-01-01
    “…However, water leak detection and irrigation scheduling traditional AI models are often computationally intensive and require complex hyperparameter tuning, making them less scalable. …”
    Get full text
    Article
  10. 2690

    Cellulosic-based microneedles for sensing heavy metals in fish samples by Houman Kholafazad, Mahdiyeh Pazhuhi, Mohammad Hasanzadeh, Nicolas H. Voelcker, Nasrin Shadju, Azadeh Nilghaz

    Published 2025-06-01
    “…The MNs exhibit low reagent and sample volume requirements along with flexibility and ease of penetration into samples, and filtration capabilities that allow efficient detection with minimal interference. The structure of MNs was investigated by field emission scanning electron microscopy (FE-SEM), revealing a conical shape with an average height of ∼750 µm and a diameter of ∼500 µm. …”
    Get full text
    Article
  11. 2691

    PlantHealthNet: Transformer-Enhanced Hybrid Models for Disease Diagnosis and Severity Estimation in Agriculture by Abid Iqbal

    Published 2025-01-01
    “…The suggested system improves precision agriculture by making disease detection and management reliable, scalable, and efficient. …”
    Get full text
    Article
  12. 2692
  13. 2693

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  14. 2694

    Energy-aware federated learning for secure edge computing in 5G-enabled IoT networks by Milad Rahmati

    Published 2025-05-01
    “…To address these challenges, we propose an energy-aware federated learning (EAFL) framework, integrating adaptive client selection, quantization-aware model updates, and blockchain-enhanced security mechanisms to improve both energy efficiency and resistance to model poisoning attacks and adversarial gradient manipulations. …”
    Get full text
    Article
  15. 2695

    Optimizing Fire Scene Analysis: Hybrid Convolutional Neural Network Model Leveraging Multiscale Feature and Attention Mechanisms by Shakhnoza Muksimova, Sabina Umirzakova, Mirjamol Abdullaev, Young-Im Cho

    Published 2024-11-01
    “…The proposed model integrates advanced convolutional neural networks with multiscale feature extraction, attention mechanisms, and ensemble learning to achieve superior performance in real-time fire detection. By leveraging the strengths of pre-trained networks such as ResNet50, VGG16, and EfficientNet-B3, the model captures detailed features at multiple scales, ensuring robust detection capabilities. …”
    Get full text
    Article
  16. 2696

    Uncertainty CNNs: A path to enhanced medical image classification performance by Vasileios E. Papageorgiou, Georgios Petmezas, Pantelis Dogoulis, Maxime Cordy, Nicos Maglaveras

    Published 2025-02-01
    “…In this paper, we introduce a low-complexity uncertainty-based CNN architecture for medical image classification, particularly focused on tumor and heart failure (HF) detection. …”
    Get full text
    Article
  17. 2697

    An Automated Image Segmentation, Annotation, and Training Framework of Plant Leaves by Joining the SAM and the YOLOv8 Models by Lumiao Zhao, Kubwimana Olivier, Liping Chen

    Published 2025-04-01
    “…Recognizing plant leaves in complex agricultural scenes is challenging due to high manual annotation costs and real-time detection demands. …”
    Get full text
    Article
  18. 2698

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…However, these models often struggle to effectively handle the temporal dependencies, complexity, and scalability required for real-time threat detection. …”
    Get full text
    Article
  19. 2699

    End-of-Line Quality Control Based on Mel-Frequency Spectrogram Analysis and Deep Learning by Jernej Mlinarič, Boštjan Pregelj, Gregor Dolanc

    Published 2025-07-01
    “…These methods struggle to detect complex or subtle patterns associated with early-stage faults. …”
    Get full text
    Article
  20. 2700

    Drainage Pipeline Multi-Defect Segmentation Assisted by Multiple Attention for Sonar Images by Qilin Jin, Qingbang Han, Jianhua Qian, Liujia Sun, Kao Ge, Jiayu Xia

    Published 2025-01-01
    “…Drainage pipeline construction projects are vulnerable to a range of defects, such as branch concealed joints, variable diameter, two pipe mouth significances, foreign object insertion, pipeline rupture, and pipeline end disconnection, generated during long-term service in a complex environment. This paper proposes two enhancements to multiple attention learning to detect and segment multiple defects. …”
    Get full text
    Article