-
1241
Custom Network Quantization Method for Lightweight CNN Acceleration on FPGAs
Published 2024-01-01Get full text
Article -
1242
6DOF Wireless Tracking Wand Using MARG and Vision Sensor Fusion
Published 2014-06-01Get full text
Article -
1243
-
1244
Design Considerations of Self-Adaptive Wireless M2M Network Communication Architecture
Published 2013-12-01Get full text
Article -
1245
-
1246
A Survey on Sensor-Cloud: Architecture, Applications, and Approaches
Published 2013-02-01Get full text
Article -
1247
An efficient reconfigurable ad-hoc algorithm for multi-sink wireless sensor networks
Published 2017-09-01“…In the third stage, the sinks collect sensed data through the trees. The protocol has been modelled by a timed Petri net, which is used first for a qualitative validation in which deadlocks, operational functionality, overflows, bottlenecks, and delays were checked, and later for network performance analysis.…”
Get full text
Article -
1248
A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks
Published 2011-09-01Get full text
Article -
1249
Ant-Based Transmission Range Assignment Scheme for Energy Hole Problem in Wireless Sensor Networks
Published 2012-12-01“…We investigate the problem of uneven energy consumption in large-scale many-to-one sensor networks (modeled as concentric coronas) with constant data reporting, which is known as an energy hole around the sink. …”
Get full text
Article -
1250
A Flexible Framework for Assessing the Quality of Information in Wireless Sensor Networks
Published 2015-10-01Get full text
Article -
1251
Automatic Classification of Online Learner Reviews Via Fine-Tuned BERTs
Published 2025-02-01Get full text
Article -
1252
Global high-resolution fire-sourced PM<sub>2.5</sub> concentrations for 2000–2023
Published 2025-08-01“…However, research on the climatic and health impacts of fire emissions is severely limited by the scarcity of air pollution data directly attributed to these emissions. Here, we develop a global daily fire-sourced PM<span class="inline-formula"><sub>2.5</sub></span> concentration ([PM<span class="inline-formula"><sub>2.5</sub></span>]) dataset at a spatial resolution of 0.25° for the period 2000–2023, using the GEOS-Chem chemical transport model driven with two fire emission inventories, the Global Fire Emissions Database version 4.1 with small fires (GFED4.1s) and the Quick Fire Emission Dataset version 2.5r1 (QFED2.5). …”
Get full text
Article -
1253
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
1254
Based on Regular Expression Matching of Evaluation of the Task Performance in WSN: A Queue Theory Approach
Published 2014-01-01“…Due to the limited resources of wireless sensor network, low efficiency of real-time communication scheduling, poor safety defects, and so forth, a queuing performance evaluation approach based on regular expression match is proposed, which is a method that consists of matching preprocessing phase, validation phase, and queuing model of performance evaluation phase. …”
Get full text
Article -
1255
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security
Published 2025-07-01“…The synergy between DNN-based anomaly detection and Blockchain-based security provides a robust, scalable, and adaptive solution for real-time cybersecurity threats in IoT networks. With a low false-positive rate of 15.42% and a strong detection accuracy of 99.18%, the proposed model successfully identifies malicious activity, including malware injections and Distributed Denial of Service (DDoS) assaults. …”
Get full text
Article -
1256
Fusion of DS-InSAR and THPF-LSTM for monitoring and predicting surface deformation in closed mines
Published 2025-06-01“…Due to the lack of supervision of mine closure, the spatial and temporal evolution of surface deformation and prediction and warning models are not well studied. To this end, we proposed a prediction model for surface deformation of closed mines combining distributed scatter interferometric synthetic aperture radar (DS-InSAR), temporal high pass filtering (THPF), and a long short term memory network (LSTM). …”
Get full text
Article -
1257
Spatial variability of hydraulic parameters of a cropped soil using horizontal crosshole ground penetrating radar
Published 2025-01-01“…Therefore, sequential inversion of the GPR‐derived SWCs was performed using the hydrological model HYDRUS‐1D, whereby the SWC data were either averaged prior inversion or used in a spatially distributed way. …”
Get full text
Article -
1258
Federated learning and information sharing between competitors with different training effectiveness
Published 2025-11-01“…Despite its substantial benefits, the adoption of FL in competitive markets faces significant challenges, particularly due to concerns about training effectiveness and price competition. In practice, data from different firms may not be independently and identically distributed (non-IID) and heterogenous, which can lead to differences in model training effectiveness when aggregated through FL. …”
Get full text
Article -
1259
Hybrid AI for Predictive Cyber Risk Assessment: Federated Graph-Transformer Architecture With Explainability
Published 2025-01-01“…Traditional risk assessment methods, often based on static rules and signature matching, fail to provide sufficient predictive capabilities in scenarios characterized by high-volume, heterogeneous data and evolving attack patterns. Furthermore, conventional machine learning models lack architectural flexibility and contextual awareness to detect stealthy or multi-stage attacks across distributed environments. …”
Get full text
Article -
1260
Exploring the impact of urban spatial morphology on land surface temperature: A case study in Linyi City, China.
Published 2025-01-01“…The High-High LISA values are distributed in the central and western areas, and the Low-Low LISA values are found in the northern regions and some scattered counties. …”
Get full text
Article