-
321
Industrialization 2.0 in the Russian Federation: Professional Aspect
Published 2025-06-01Get full text
Article -
322
CLOUD MANUFACTURING: IDENTIFICATIONS AND PRIORITIZATION OF OPPORTUNITIES USING AHP
Published 2022-06-01Get full text
Article -
323
Generative Adversarial Network for Damage Identification in Civil Structures
Published 2021-01-01“…In recent years, many efforts have been made to develop efficient deep-learning-based structural health monitoring (SHM) methods. …”
Get full text
Article -
324
DYMOS: A New Software for the Dynamic Identification of Structures
Published 2025-06-01“…By using CAD drawings as input, it streamlines model construction, making the process faster, more intuitive, and efficient. …”
Get full text
Article -
325
Acoustic cues for person identification using cough sounds
Published 2025-01-01“…While recent works have demonstrated the feasibility of cough-based PID (CPID), most report accuracies around 80–90 % and could face limitations in terms of model efficiency, generalization, or robustness. …”
Get full text
Article -
326
Risk Identification and Spatiotemporal Evolution in Rural Land Trusteeship
Published 2025-05-01Get full text
Article -
327
Memory-corrected quantum repeaters with adaptive syndrome identification
Published 2025-01-01“…To this end, we introduce the check matrix model and quantify the resilience of stabilizer codes of up to eleven qubits against Pauli noise, obtaining analytical expressions for effective logical error probabilities. …”
Get full text
Article -
328
ICRSSD: Identification and Classification for Railway Structured Sensitive Data
Published 2025-06-01“…To improve the efficiency of regular expression generation, we developed an auxiliary tool with the help of large language models and a well-designed prompt framework. …”
Get full text
Article -
329
Faults Detection and Diagnosis of a Large-Scale PV System by Analyzing Power Losses and Electric Indicators Computed Using Random Forest and KNN-Based Prediction Models
Published 2025-05-01“…This paper introduces a novel approach for fault detection and diagnosis in large-scale PV systems, utilizing power loss analysis and predictive models based on Random Forest (RF) and K-Nearest Neighbors (KNN) algorithms. …”
Get full text
Article -
330
Ensemble of Efficient Vision Transformers for Insect Classification
Published 2025-07-01Get full text
Article -
331
-
332
RFID-Based Real-Time Salt Concentration Monitoring with Adaptive EKF
Published 2025-06-01Get full text
Article -
333
Analysis of selected methods of person identification based on biometric data
Published 2025-06-01“…The research employs three ground-breaking convolutional neural network architectures: ResNet50, EfficientNetB0, and VGG16. The project's objective was to examine the influence of critical factors, such as image quality and data processing techniques, on the performance of face identification systems. …”
Get full text
Article -
334
Machine Learning with Administrative Data for Energy Poverty Identification in the UK
Published 2025-06-01“…Energy poverty continues to be a critical challenge, and this requires efficient and scalable identification methods to support targeted interventions. …”
Get full text
Article -
335
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
Get full text
Article -
336
Identification of rice leaf disease based on DepMulti-Net
Published 2025-03-01“…This research presents DepMulti-Net, a novel rice disease and pest identification model, designed to overcome the challenges of complex background interference, difficult disease feature extraction, and large model parameter volume in rice leaf disease identification. …”
Get full text
Article -
337
ACFM: Adaptive Channel Feature Matching for Pedestrian Re-Identification
Published 2025-01-01“…Image misalignment is a significant challenge in the field of pedestrian re-identification. Previous studies typically align pedestrian features using additional models or by leveraging auxiliary information. …”
Get full text
Article -
338
A Convolutional Neural Network for Early Supraventricular Arrhythmia Identification
Published 2025-01-01“…This approach not only offers a valuable tool for healthcare professionals engaged in telemonitoring and early intervention strategies but also represents a significant contribution to the field of cardiac health monitoring. By facilitating efficient and precise identification of SVEs, our research sets the stage for improved patient outcomes and the prevention of severe SVAs, marking substantial advancements in this critical domain.…”
Get full text
Article -
339
Scoring System for Quantifying the Privacy in Re-Identification of Tabular Datasets
Published 2025-01-01“…SCORR extends conventional metrics such as k-anonymity, l-diversity, and t-closeness with novel extended metrics, including uniqueness-only risk, uniformity-only risk, correlation-only risk, and Markov Model risk, to identify a broader range of re-identification threats. …”
Get full text
Article -
340
Convolutional Neural Networks for Automatic Identification of Individuals at Terrestrial Terminals
Published 2025-01-01“…Finally, the trained models were integrated into a web application that enables real-time identification using IP cameras, leveraging YOLO version 8 architecture for tracking identified individuals. …”
Get full text
Article