Search alternatives:
resource » resources (Expand Search)
source » sources (Expand Search)
Showing 521 - 540 results of 1,810 for search '((( resource OR resource) detection function ) OR ( source detection functions ))', query time: 0.29s Refine Results
  1. 521

    VIRify: An integrated detection, annotation and taxonomic classification pipeline using virus-specific protein profile hidden Markov models. by Guillermo Rangel-Pineros, Alexandre Almeida, Martin Beracochea, Ekaterina Sakharova, Manja Marz, Alejandro Reyes Muñoz, Martin Hölzer, Robert D Finn

    Published 2023-08-01
    “…Overall, we demonstrate that VIRify is a novel and powerful resource that offers an enhanced capability to detect a broad range of viral contigs and taxonomically classify them.…”
    Get full text
    Article
  2. 522

    Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization by Wahid Rajeh, Majed Aborokbah, Manimurugan S., Umar Albalawi, Ahamed Aljuhani, Osama Shibl Abdalghany Younes, Karthikeyan Periyasami

    Published 2025-03-01
    “…Methods This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. …”
    Get full text
    Article
  3. 523

    Multiepoch Observations of the Nearby Spiral Galaxy NGC 3938 with the Chandra X-Ray Observatory by Siddhi Raut, Eric M. Schlegel, Thomas G. Pannuti, Brannon W. Jones, Jacobo Matallana

    Published 2025-01-01
    “…A total of 47 discrete merged sources from both epochs were detected at the ≈3 σ level or greater with the D25 radius. …”
    Get full text
    Article
  4. 524

    ContDataQC: An R package and Shiny app for quality control of continuous water quality sensor data by Michael J. Pennino, Jen Stamp, Erik W. Leppo, David A. Gibbs, Britta G. Bierwagen

    Published 2025-05-01
    “…ContDataQC helps users speed up and standardize the QC process, minimize undetected data errors, and make full use of their sensor data. It has three main functions: generate QC reports to detect anomalies and erroneous data values, merge QC'd data files from different time periods, and generate time series plots and basic summary statistics. …”
    Get full text
    Article
  5. 525
  6. 526
  7. 527

    DETECTION AND SYSTEMATIZATION OF SIGNS AND MARKERS OF MODIFICATIONS IN MEDIA CONTENT FOR THE DEVELOPMENT OF A METHODOLOGY TO ENHANCING CRITICAL THINKING IN THE ERA OF DEEPFAKES by Ганна Чемерис

    Published 2024-02-01
    “…The paper focuses on creating a comprehensive framework for detecting manipulated content and identifying indicators such as pixelization, unnatural expressions, etc. …”
    Get full text
    Article
  8. 528

    Short-Circuit Protection Circuit With Current Slope-to-Digital Conversion Short-Circuit Detection and Adaptive Soft Turn-Off by Seungjik Lee, Jinman Myung, Geonwoo Park, Yoseph Kim, Ockgoo Lee, Ilku Nam

    Published 2025-01-01
    “…It ensures that the drain–source voltage overshoot remains below 14.5% of the drain–source voltage while achieving a consistent response delay of approximately 750 ns for short-circuit detection and a turn-off time of approximately 500 ns for soft turn-off operation.…”
    Get full text
    Article
  9. 529

    RE-YOLO: An apple picking detection algorithm fusing receptive-field attention convolution and efficient multi-scale attention. by Jinxue Sui, Li Liu, Zuoxun Wang, Li Yang

    Published 2025-01-01
    “…The accuracy of current apple picking detection algorithms is still limited when the distribution is dense and occlusion exists, and there is a significant challenge in deploying current high accuracy detection models on edge devices with limited computational resources. …”
    Get full text
    Article
  10. 530
  11. 531

    Empowering Healthcare: TinyML for Precise Lung Disease Classification by Youssef Abadade, Nabil Benamar, Miloud Bagaa, Habiba Chaoui

    Published 2024-10-01
    “…However, it has limitations, such as a lack of recording functionality, dependence on the expertise and judgment of physicians, and the absence of noise-filtering capabilities. …”
    Get full text
    Article
  12. 532

    Context-dependent PSIICOS: A novel framework for functional connectivity estimation accounting for task-related power leakage by Daria Kleeva, Alexei Ossadtchi

    Published 2025-08-01
    “…The results demonstrate that CD-PSIICOS outperforms the original PSIICOS in suppressing artifacts at the lower projection ranks, maintaining robust detection of functional networks across theta and gamma frequency bands. …”
    Get full text
    Article
  13. 533
  14. 534
  15. 535
  16. 536

    APPLICATION OF THE SPECTROMETRIC METHOD FOR CALCULATING THE DOSE RATE FOR CREATING CALIBRATION HIGHLY SENSITIVE INSTRUMENTS BASED ON SCINTILLATION DETECTION UNITS by R. V. Lukashevich, G. A. Fokov

    Published 2017-09-01
    “…The results of the calculation function G(E) for the detection unit on the basis of NaI(Tl) detector (Ø40 mm, h = 40 mm) to use it as a comparator for kerma rate in the air certification of low intenseе photon radiation fields.…”
    Get full text
    Article
  17. 537

    A SERS‐Based Antibody‐Aptamer Sandwich Assay for Extracellular Vesicle‐Associated Tau Detection Using Gold Nanoparticles by Saqer Al Abdullah, Samaneh Ghadami, Md. Arifur Rahman Khan, Farbod Ebrahimi, Kyle Nowlin, Tetyana Ignatova, Kristen Dellinger

    Published 2025-08-01
    “…Subsequently, adding gold nanoparticles functionalized with SERS probes and aptamers enabled the detection of tau in EVs using SERS. …”
    Get full text
    Article
  18. 538

    Detection of power theft in sensitive stations based on generalized robust distance metric and multi-classification support vector machine by Wei Zhang, Qiong Cao, Shuai Yang, Hao Guo

    Published 2025-04-01
    “…Through training and optimization, the support vector machine outputs the detection results of electricity stealing behavior according to the decision function, and realizes the accurate detection of electricity stealing behavior. …”
    Get full text
    Article
  19. 539

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…Deep learning (DL) models show strong potential in detecting DoW attacks, where attackers disrupt services by exploiting system resources. …”
    Get full text
    Article
  20. 540

    Exploratory integration of near-infrared spectroscopy with clinical data: a machine learning approach for HCV detection in serum samples by Eloy Pérez-Gómez, José Gómez, José Gómez, Jennifer Gonzalo, Sergio Salgüero, Daniel Riado, María Luisa Casas, María Luisa Gutiérrez, Elena Jaime, Enrique Pérez-Martínez, Rafael García-Carretero, Javier Ramos, Conrado Fernández-Rodríguez, Conrado Fernández-Rodríguez, Myriam Catalá, Myriam Catalá, Luca Martino, Óscar Barquero-Pérez

    Published 2025-06-01
    “…Feature importance analysis highlighted specific wavelengths near 1,150 nm, 1,410 nm, and 1,927 nm, associated with water molecular states and liver function biomarkers (GPT, GOT, GGT), reinforcing the biological relevance of this approach.ConclusionsThese findings suggest that integrating NIRS and clinical data through machine learning enhances HCV diagnostic capabilities, offering a scalable and non-invasive alternative for early detection and risk assessment.…”
    Get full text
    Article