Search alternatives:
functions » function (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
Showing 241 - 260 results of 1,810 for search '((( resource OR resource) detection functions ) OR ( source detection functions ))', query time: 0.33s Refine Results
  1. 241

    Radar Detection Simulation by Digital Twins of Target and Antenna System by A. S. Grigoriev, A. A. Kazantsev, A. M. Terentyev, B. S. Stavtsev

    Published 2025-03-01
    “…The signal-to-noise dynamic dependence of the given radar system, space object, and observation scenario, presented by their digital models, was calculated. The function of detection probability density was calculated, which demonstrated an insufficient detection capacity of a radar system in the case of observation of such type of objects.Conclusion. …”
    Get full text
    Article
  2. 242

    Improved CSW-YOLO Model for Bitter Melon Phenotype Detection by Haobin Xu, Xianhua Zhang, Weilin Shen, Zhiqiang Lin, Shuang Liu, Qi Jia, Honglong Li, Jingyuan Zheng, Fenglin Zhong

    Published 2024-11-01
    “…The diversity of bitter melon shapes has a direct impact on its market acceptance and consumer preferences, making precise identification of bitter melon germplasm resources crucial for breeding work. To address the limitations of time-consuming and less accurate traditional manual identification methods, there is a need to enhance the automation and intelligence of bitter melon phenotype detection. …”
    Get full text
    Article
  3. 243
  4. 244

    Schizophrenia Detection and Classification: A Systematic Review of the Last Decade by Arghyasree Saha, Seungmin Park, Zong Woo Geem, Pawan Kumar Singh

    Published 2024-11-01
    “…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
    Get full text
    Article
  5. 245

    Fast detection method for radionuclides based on Sequential Bayesian approach by WAN Linjian, ZHANG Xuan, ZHANG Chunlei, HUANG Jianwei, LIU Jiacheng, ZHANG Xiaole, LI Dehong, YANG Zhijun

    Published 2025-01-01
    “…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
    Get full text
    Article
  6. 246

    Survey on key technologies for protective DNS service by MA Yongzheng, LI Hongtao, MA Zhongsheng, HU Weihong, ZHANG Zhongxian

    Published 2024-10-01
    “…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
    Get full text
    Article
  7. 247

    The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables by Niccolò Veronesi, Maria Charisi, Stephen R. Taylor, Jessie Runnoe, Daniel J. D’Orazio

    Published 2025-01-01
    “…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
    Get full text
    Article
  8. 248
  9. 249
  10. 250
  11. 251

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  12. 252

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
    Get full text
    Article
  13. 253

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  14. 254

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  15. 255

    A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone by Junjie Liu, Qingfubo Geng, Zhaoxin Geng

    Published 2024-08-01
    “…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
    Get full text
    Article
  16. 256

    Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning by Bingyi Liu, Anqi Wang, Chengqian Xia

    Published 2025-01-01
    “…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as “black boxes” that limit their practical utility. …”
    Get full text
    Article
  17. 257

    Water quality anomaly detection research based on GRU-PINN model by Zhao Xinyu

    Published 2025-01-01
    “…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
    Get full text
    Article
  18. 258

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article
  19. 259

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  20. 260

    SR-DETR: Target Detection in Maritime Rescue from UAV Imagery by Yuling Liu, Yan Wei

    Published 2025-06-01
    “…These outcomes highlight the practicality and reliability of our method in detecting individuals overboard, contributing to more precise and resource-efficient solutions for real-time maritime rescue efforts.…”
    Get full text
    Article