Search alternatives:
\\"resource » \\"source (Expand Search)
Showing 41 - 60 results of 907 for search '"\"((\\"sources detection functions\\") OR ((\\"resource OR \"success) detection function\\"))\""', query time: 0.12s Refine Results
  1. 41
  2. 42
  3. 43

    The FAST Ursa Major Supergroup H i Survey (FUMaS): Catalog and H i Mass Function by Haiyang Yu, Ming Zhu, Chuan-Peng Zhang, Peng Jiang, Jin-Long Xu

    Published 2025-01-01
    “…Among them, 55 H i sources were detected for the first time, of which 32 do not have known optical redshifts. …”
    Get full text
    Article
  4. 44
  5. 45

    Toward Compliance and Transparency in Raw Material Sourcing With Blockchain and Edge AI by Abderrahim Khiari, Anas Osman, Massimo Vecchio, Mattia Antonini, Miguel Pincheira

    Published 2025-01-01
    “…Our fully functional prototype achieves high performance (94% F1-score, 98% recall), with minimal resource usage (8.45KB RAM, 407KB flash) and fast inference (5.25 ms), making it well-suited for deployment at the network edge. …”
    Get full text
    Article
  6. 46
  7. 47

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  8. 48
  9. 49

    Research on multi-sensor fusion detection and tracking technology for autonomous-rail rapid transit tram by PAN Wenbo, YUAN Xiwen, LIN Jun, XIE Guotao, LONG Teng, HUANG Wenyu

    Published 2022-07-01
    “…Firstly, a millimeter-wave radar and LiDAR are used to perceive by single sensor, and the sensing results were merged by using a multi-source fusion algorithm, to generate more accurate detection results. …”
    Get full text
    Article
  10. 50

    SegTrackDetect: A window-based framework for tiny object detection via semantic segmentation and tracking by Aleksandra Kos, Karol Majek, Dominik Belter

    Published 2025-05-01
    “…This work introduces SegTrackDetect, an open-source, window-based framework for small and tiny object detection. …”
    Get full text
    Article
  11. 51

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  12. 52
  13. 53

    Analytical method for determining coordinates of the radiation source in a homogeneous medium by H. V. Velichko

    Published 2015-12-01
    “…The problem is reduced to finding the minimum of a nonlinear function of five variables. This function is the sum of the squares of the differences of the calculated and the actual time of the wave front passing through the sensor for each of the sensors. …”
    Get full text
    Article
  14. 54

    A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm by Zhaotao Yan, Zhaofa Zeng, Jianwei Zhao

    Published 2025-06-01
    “…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
    Get full text
    Article
  15. 55

    ENDOCRINE PANCREATIC FUNCTION IN ACUTE PANCREATITIS by P. V. Novokhatny

    Published 2014-02-01
    “…In a significant proportion of patients who recovered from acute pancreatitis, exocrine and endocrine functional impairments were found. This finding was not detected only in patients after severe acute pancreatitis. …”
    Get full text
    Article
  16. 56

    Sustainable Materials Enabled Terahertz Functional Devices by Baoning Wang, Haolan Wang, Ying Bao, Waqas Ahmad, Wenhui Geng, Yibin Ying, Wendao Xu

    Published 2025-04-01
    “…Highlights Sources and types of sustainable materials and their advantages in fabricating high performance terahertz (THz) functional devices are systematically reviewed. …”
    Get full text
    Article
  17. 57

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  18. 58
  19. 59

    Infrared Satellite Detection Limits for Monitoring Atmospheric Ammonia by Mark W. Shephard, Shailesh K. Kharol, Enrico Dammers, Christopher E. Sioris, Andrew Bell, Rik Jansen, Jerome Caron, Ralph Snel, Emanuela Palombo, Karen E. Cady-Pereira, Chris A. McLinden, Erik Lutsch, Robert O. Knuteson

    Published 2025-01-01
    “…Information on the frequency of a given detection limit, and the cumulative probability of detection, are provided as a function of instrument spectral resolution and noise. …”
    Get full text
    Article
  20. 60