68   Artículos

 
en línea
Viktor Masalskyi, Dominykas Ciciurenas, Andrius Dzedzickis, Urte Prentice, Gediminas Braziulis and Vytautas Bucinskas    
This paper addresses the challenge of synchronizing data acquisition from independent sensor systems in a local network. The network comprises microcontroller-based systems that collect data from physical sensors used for monitoring human gait. The synch... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Youngkwang Kim, Woochan Kim, Jungwoo Yoon, Sangkug Chung and Daegeun Kim    
This paper presents a practical contamination detection system for camera lenses using image analysis with deep learning. The proposed system can detect contamination in camera digital images through contamination learning utilizing deep learning, and it... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yu Zhang, Jiajun Niu, Zezhong Huang, Chunlei Pan, Yueju Xue and Fengxiao Tan    
An algorithm model based on computer vision is one of the critical technologies that are imperative for agriculture and forestry planting. In this paper, a vision algorithm model based on StyleGAN and improved YOLOv5s is proposed to detect sandalwood tre... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Sadia Alam Shammi, Yanbo Huang, Gary Feng, Haile Tewolde, Xin Zhang, Johnie Jenkins and Mark Shankle    
The application of remote sensing, which is non-destructive and cost-efficient, has been widely used in crop monitoring and management. This study used a built-in multispectral imager on a small unmanned aerial vehicle (UAV) to capture multispectral imag... ver más
Revista: Agronomy    Formato: Electrónico

 
en línea
Heiko Oppel and Michael Munz    
Human monitoring systems are already utilized in various fields like assisted living, healthcare or sport and fitness. They are able to support in everyday life or act as a pre-warning system. We developed a system to monitor the ascent of a sport climbe... ver más
Revista: AI    Formato: Electrónico

 
en línea
Olga S. Arvaniti, Georgios Gkotsis, Maria-Christina Nika, Stelios Gyparakis, Thrassyvoulos Manios, Nikolaos S. Thomaidis, Michalis S. Fountoulakis and Athanasios S. Stasinakis    
The presence of 220 emerging contaminants belonging to different classes (artificial sweeteners, personal care products, coffee and tobacco-related compounds, and industrial chemicals) was investigated in hospital wastewater for the first time. Twenty sa... ver más
Revista: Water    Formato: Electrónico

 
en línea
Yunhan Geng, Shaojuan Su, Tianxiang Zhang and Zhaoyu Zhu    
Centrifugal pumps are susceptible to various faults, particularly under challenging conditions such as high pressure. Swift and accurate fault diagnosis is crucial for enhancing the reliability and safety of mechanical equipment. However, monitoring data... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Jhon Fredy Narvaez Valderrama, Juan D. González, Jazmín Porras and Francisco J. Molina    
Persistent Organic Pollutants (POPs) in water can reach levels below ppt (ng L-1), representing a challenge for risk assessment using long-term exposure. Therefore, sampling devices to monitor trace levels of organic compounds are suitable due to their s... ver más
Revista: Water    Formato: Electrónico

 
en línea
Sadeq A. A. Alkhadher, Hussein E. Al-Hazmi, Suhaimi Suratman, Mohamad P. Zakaria, Najat Masood, Bartosz Szelag, Sami M. Magam, Ebrahim H. H. Al-Qadami, Joanna Majtacz, Przemyslaw Kowal, Tonni A. Kurniawan, Sameer A. M. Abdulrahman and Saeed S. Albaseer    
In this study, the use of linear alkylbenzenes (LABs) was employed to pinpoint the sources of human activity that cause detrimental impacts on the coastal environment and river ecosystems. LABs were detected using GC?MS in sediment samples assembled from... ver más
Revista: Water    Formato: Electrónico

 
en línea
Ibrahim Ba?abbad and Omar Batarfi    
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa... ver más
Revista: Computers    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »