-
381
Study of Complex Impedance Dispersion Model for Two-Phase Laminar Flow
Published 2023-12-01“…Therefore, it is imperative to identify a more cost-effective and efficient measurement method. Complex impedance spectrum (CIS) detection technology emerges as a promising solution, offering advantages such as low cost, easy implementation, environmental friendliness, and safety. …”
Get full text
Article -
382
The self supervised multimodal semantic transmission mechanism for complex network environments
Published 2025-08-01“…Abstract With the rapid development of intelligent transportation systems, the challenge of achieving efficient and accurate multimodal traffic data transmission and collaborative processing in complex network environments with bandwidth limitations, signal interference, and high concurrency has become a key issue that needs to be addressed. …”
Get full text
Article -
383
An Effective Algorithm for Video-Based Parking and Drop Event Detection
Published 2019-01-01Get full text
Article -
384
Neighbor Similarity Based Agglomerative Method for Community Detection in Networks
Published 2019-01-01“…Community structures can reveal organizations and functional properties of complex networks; hence, detecting communities from networks is of great importance. …”
Get full text
Article -
385
THE USE OF HARDWARE AND SOFTWARE COMPLEX FOR MONITORING THE STATUS OF EMPLOYEES OF THE NUCLEAR STATION
Published 2019-06-01“…It is shown that early detection of adverse psycho-physiological states using software and hardware complex at the nuclear power plant workers in a timely manner for both psychological and pharmacological correction, aimed at improving the efficiency of tasks in the conditions of aggressive professional environment .…”
Get full text
Article -
386
MATHEMATICAL MODEL OF COMPLEX PROTECTION OF AN INFOCOMMUNICATION OBJECT BASED ON "PLAYING WITH NATURE"
Published 2022-08-01“…The algorithm of formalization of protection processes is proposed, which ensures efficient use of resources when detecting possible incidents of violation of the protection system and/or unauthorized access. …”
Get full text
Article -
387
Key nodes identification in complex networks based on subnetwork feature extraction
Published 2023-07-01Get full text
Article -
388
Methodology for ensuring the functional stability of aircraft integrated modular avionics complex
Published 2024-02-01“…To increase the efficiency of the integrated avionics complex under conditions of destabilizing influences, the optimal structure of the avionics complex of the D-42 aircraft was synthesized according to the criterion of the maximum indicator of functional stability with the limitation of the cost of construction the system. …”
Get full text
Article -
389
Detecting Signatures of Criticality Using Divergence Rate
Published 2025-04-01“…In biology especially, these signatures of criticality are thought to be connected with efficient computation and information processing. Guided by the classical theory of rate–distortion (RD) from information theory, we propose a measure for detecting and characterizing such phenomena from data. …”
Get full text
Article -
390
Diagnostic efficiency of exome-based sequencing in pediatric patients with epilepsy
Published 2025-01-01“…This study aims to evaluate the detection efficiencies of different exome-based sequencing techniques.MethodsExome-based epilepsy panel tests, clinical exome sequencing (CES), and whole exome sequencing (WES) were conducted on 259 pediatric patients diagnosed with epilepsy. …”
Get full text
Article -
391
Lightweight framework for misbehavior detection in internet of vehicles
Published 2025-03-01“…Despite LTC and CFC having significantly fewer parameters, making them less complex and more space-efficient than CNN-LSTM, the latter proves to be more time-efficient. …”
Get full text
Article -
392
Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
Published 2025-03-01“…The increasing prevalence of cyber threats in wireless sensor networks (WSNs) necessitates adaptive and efficient security mechanisms to ensure robust data transmission while addressing resource constraints. …”
Get full text
Article -
393
An efficient graph attention framework enhances bladder cancer prediction
Published 2025-04-01Get full text
Article -
394
Hierarchical Information-guided robotic grasp detection
Published 2025-05-01“…Abstract With the advancement of deep learning, robotic grasping has seen widespread application in fields, becoming a critical component in enhancing automation. Accurate and efficient grasping capabilities not only significantly boost productivity but also ensure safety and reliability in complex and dynamic environments. …”
Get full text
Article -
395
Deposit thickness control of the heat exchange equipment by hardware and software complex
Published 2020-11-01Get full text
Article -
396
Rapid equivalent simplification algorithm for complex underground mine ventilation networks
Published 2025-01-01“…To address these challenges, a rapid equivalent simplification algorithm for complex mine ventilation networks is proposed. This algorithm employs strong connectivity component algorithms from graph theory to swiftly detect unidirectional loops within the network. …”
Get full text
Article -
397
Attention-enhanced StrongSORT for robust vehicle tracking in complex environments
Published 2025-05-01“…Third, the optimized CBH-Conv module employs Hardswish activation and depthwise separable convolution to mitigate gradient vanishing while maintaining real-time efficiency (achieving a 17% MOTA improvement at 213 FPS).Evaluated on the MOT-16 dataset, AE-StrongSORT demonstrates substantial improvements over the baseline StrongSORT, with 17%, 2.78%, and 9.99% gains in MOTA, HOTA, and IDF1 metrics respectively, alongside significant reductions in false/missed detections. …”
Get full text
Article -
398
Optimized Faster R-CNN with Swintransformer for Robust Multi-Class Wildfire Detection
Published 2025-04-01“…Wildfires are a critical global threat, emphasizing the need for efficient detection systems capable of identifying fires and distinguishing fire-related from non-fire events in their early stages. …”
Get full text
Article -
399
A one-stage anchor-free keypoints detection model for fast electric vehicle charging port detection and pose extraction
Published 2025-05-01“…Experiments demonstrate that in complex lighting scenarios, FasterEVPoints boasts 95% detection accuracy on a proprietary dataset with a positioning error of less than 2 cm at a 50 cm distance. …”
Get full text
Article -
400
Audio Deepfake Detection Using Deep Learning
Published 2025-03-01“…ABSTRACT This study introduces an enhanced Siamese convolutional neural network (Siamese CNN) architecture with a novel StacLoss function and self‐attention modules for efficient identification of audio deepfakes. Our module directly compares unprocessed original audio with modified audio by initially applying convolutional operations and dual branches to extract complex characteristics from raw audio signals. …”
Get full text
Article