-
301
-
302
Joint Identification and Sensing for Discrete Memoryless Channels
Published 2024-12-01“…In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver’s goal is simply to verify whether a specific message of interest was sent. …”
Get full text
Article -
303
Modal Parameter Identification of the Improved Random Decrement Technique-Stochastic Subspace Identification Method Under Non-Stationary Excitation
Published 2025-01-01“…This not only improves the signal-to-noise ratio of the signal, but also improves the computational efficiency significantly. A non-stationary excitation is applied to the spatial grid structure model, and the RDT-SSI method is used to identify the modal parameters. …”
Get full text
Article -
304
Enhancing DeepLabv3+ Convolutional Neural Network Model for Precise Apple Orchard Identification Using GF-6 Remote Sensing Images and PIE-Engine Cloud Platform
Published 2025-05-01“…This study enhanced the DeepLabv3+ model to achieve superior performance in apple orchard identification by incorporating ResNet, optimizing the algorithm, and adjusting hyperparameter configuration using the PIE-Engine cloud platform. …”
Get full text
Article -
305
YOLOv8 forestry pest recognition based on improved re-parametric convolution
Published 2025-03-01Get full text
Article -
306
-
307
Drilling Condition Identification Method for Imbalanced Datasets
Published 2025-03-01“…To address the challenges posed by class imbalance and temporal dependency in drilling condition data and enhance the accuracy of condition identification, this study proposes an integrated method combining feature engineering, data resampling, and deep learning model optimization. …”
Get full text
Article -
308
Damping Identification Sensitivity in Flutter Speed Estimation
Published 2025-05-01“…This study evaluates two frequency-domain system identification methods, Fast Relaxed Vector Fitting (FRVF) and the Loewner Framework (LF), for predicting the flutter onset speed of a flexible wing model. …”
Get full text
Article -
309
Security-centric node identification in complex networks
Published 2025-05-01“…To achieve this, we develop a mathematical model to compute SC, introduce efficient algorithms for identifying critical nodes, and implement an incremental update mechanism to enhance adaptability in real-time networks. …”
Get full text
Article -
310
FruVeg_MultiNet: A hybrid deep learning-enabled IoT system for fresh fruit and vegetable identification with web interface and customized blind glasses for visually impaired indivi...
Published 2025-03-01“…This research presents a pioneering approach for fresh fruit and vegetable identification through IoT and a hybrid deep learning model, combining EfficientNetB7 and ResNet50 architectures. …”
Get full text
Article -
311
Risks as an object of internal control: identification and assessment
Published 2021-08-01“…Identification and assessment of business risk, determining the level of its materiality and impact on the functioning of economic entities of various organizational and legal forms and forms of ownership, is possible with a properly organized system of internal control. …”
Get full text
Article -
312
Temperature-Dependent Kinetic Modeling of Nitrogen-Limited Batch Fermentation by Yeast Species
Published 2025-04-01“…The development of predictive models that accurately describe these effects is essential for automating and optimizing fermentation design, reducing trial-and-error experimentation, and improving process efficiency and product quality. …”
Get full text
Article -
313
Identification of Factors Affecting Project Financing Risk
Published 2023-09-01Get full text
Article -
314
-
315
Identification of quality problems staff vocational training
Published 2020-09-01“…Observation of the reaction of output quantities to changes in input influences allows us to construct an a posteriori model of the process, i.e. to identify the quality problem in the early stages of its inception.The purpose of this work is to investigate the possibility of ensuring the quality of personnel software by the identification method based on the results of evaluating the input and output signals of the OP as a control object. …”
Get full text
Article -
316
-
317
Contextualizing Innovation Investor Behaviour Through Structural Simulation Modelling of Influential Factors
Published 2025-04-01“…This study aims to examine the interconnections between self-efficacy, self-determination, and intrinsic motivation among individual investors; to delineate the relationships between intrinsic and extrinsic motivation, investor attitudes, perceived risk, and loyalty; and to develop a conceptual model that synthesizes these relationships. The research methodology is based on interpretive structural modelling (ISM), ensuring a systematic exploration of factor interdependencies. …”
Get full text
Article -
318
Enhancing Urban Land Utilization Through SegFormer: A Vacant Land Analysis in Chengdu
Published 2025-01-01“…This framework provides the accurate and efficient tool for UVL identification, contributing to improved urban land utilization and offering valuable insights for future research and urban planning.…”
Get full text
Article -
319
Secure and load balanced routing model for wireless sensor networks
Published 2022-07-01“…The result attained shows SLBR model attains better performance than ECSO in terms of energy efficiency (i.e., network lifetime considering first sensor device death and total sensor device death), communication overhead, throughput, packet processing latency, malicious sensor device misclassification rate and identification.…”
Get full text
Article -
320
Detecting drug transfers via the drop-off method: A supervised model approach using AIS data
Published 2024-12-01“…Unlike existing research, primarily employing unsupervised methods, we propose a supervised model specifically tailored to this illicit activity, with a particular emphasis on its application to fishing vessels.Our model significantly reduces the number of data points requiring classification by the observer by 70% , thereby enhancing the efficiency of the drop-off detection process. …”
Get full text
Article