-
261
A Review on Transformer-Based Methods for Human Activity Recognition
Published 2024-09-01“…With the expansion of smart homes, Human Activity Recognition (HAR) has become a key challenge in artificial intelligence, enhancing not only the comfort and safety of residents but also contributing to the development of applications such as healthcare and smart surveillance. …”
Get full text
Article -
262
Multilevel Database Security for Android Using Fast Encryption Methods
Published 2022-06-01Get full text
Article -
263
Blockchain modeled swarm optimized lyapunov smart contract deep reinforced secure tasks offloading in smart home
Published 2025-06-01“…To address these gaps in this, work a QoS-improved method called, Blockchain-modeled Swarm Optimized Lyapunov Smart Contract Deep Reinforced Tasks Offloading (BSOLSC-DRTO) in smart home is proposed. …”
Get full text
Article -
264
Applied aspects of modern non-blind image deconvolution methods
Published 2024-08-01Get full text
Article -
265
A mixed method approach to integrate digitization and sustainability on German farms
Published 2025-08-01Get full text
Article -
266
The pig pose recognition method based on pig body semantic segmentation
Published 2025-12-01Get full text
Article -
267
Improved lightweight health identification method for plug seedling based on FPGA
Published 2025-12-01Get full text
Article -
268
-
269
Particle Movement in DEM Models and Artificial Neural Network for Validation by Using Contrast Points
Published 2024-12-01Subjects: Get full text
Article -
270
Research on timing method of prepayment meter based on edge computing
Published 2024-03-01“…With the construction of the power IoT and the increasing popularity of smart meters, solving the problem of abnormal clock of meters and correcting the clock deviation of meters has become an increasingly important task for power companies. …”
Get full text
Article -
271
User filtering based campus WLAN user clustering method
Published 2014-10-01“…With the widespread of smart terminals such as smart phones and smart pads,using MAC address as user identification in campus wireless local area network (WLAN) user clustering research cannot exactly represent user behavior.An user filtering based user clustering is proposed.This method filters users’ behavior data by their degree of activeness,and then further conducts clustering analysis of campus WLAN user behavior.The experimental result verifies the effectiveness of the proposed method.…”
Get full text
Article -
272
Distance Measurement for the Indoor WSN Nodes Using WTR Method
Published 2014-05-01Get full text
Article -
273
AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology
Published 2024-12-01“…A smart grid (SG) is the financial benefit of a complicated and smart power system that can keep up with rising demand. …”
Get full text
Article -
274
Auto-Probabilistic Mining Method for Siamese Neural Network Training
Published 2025-04-01Get full text
Article -
275
A detection method of Android system vulnerabilities based on matching
Published 2016-05-01“…Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android users.Android system vulnerabilities were studied,and a rapid detection method of Android system vulnerabilities based on matching was proposed.A script-based vulnerability scanning tool was also designed.Through the evaluation of experiments,the tool is running well.…”
Get full text
Article -
276
Human Action Recognition Method Based on Multi-channel Fusion
Published 2025-01-01“…In this challenging context, innovative algorithms and model designs are crucial for addressing differences in CSI features between various actions and enhancing the model’s generalization ability and robustness.Method This study explores human actions’ physical and MIMO transmission characteristics, proposing a deep learning-based human action recognition method that employs a dual attention mechanism and a multi-channel, multi-scale fusion temporal convolution network to address the above challenges. …”
Get full text
Article -
277
Distributed Cooperative Backpressure-Based Traffic Light Control Method
Published 2019-01-01“…On the foundation of the original backpressure-based traffic light control algorithm, a distributed cooperative backpressure-based traffic light control method is proposed in this paper. The urban traffic network is modeled as a smart agent-controlled queuing network, in which the intersection agents exchange the queue length information and the selected activating light phase information of neighboring intersections through communications and determine the activating light phase at each time slot according to local traffic information. …”
Get full text
Article -
278
Damping Identification with Acceleration Measurements Based on Sensitivity Enhancement Method
Published 2018-01-01Get full text
Article -
279
Ripe-Detection: A Lightweight Method for Strawberry Ripeness Detection
Published 2025-07-01Get full text
Article -
280
Optimized Airspace Structures and Sequencing Method for Urban Logistics Droneport
Published 2025-03-01Get full text
Article