Search alternatives:
resource » source (Expand Search)
functions » function (Expand Search)
Showing 281 - 300 results of 1,810 for search '((( resource OR resource) detection functions ) OR ( sources detection functions ))', query time: 0.29s Refine Results
  1. 281

    A review of deep learning models to detect malware in Android applications by Elliot Mbunge, Benhildah Muchemwa, John Batani, Nobuhle Mbuyisa

    Published 2023-12-01
    “…Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions. …”
    Get full text
    Article
  2. 282

    A Universal Tire Detection Method Based on Improved YOLOv8 by Chi Guo, Mingxia Chen, Junjie Wu, Haipeng Hu, Luobing Huang, Junjie Li

    Published 2024-01-01
    “…However, traditional methods of tire defect detection have encountered problems such as slow detection speed, complex tire defect backgrounds, and limited hardware resources. …”
    Get full text
    Article
  3. 283
  4. 284

    Lightweight obstacle detection for unmanned mining trucks in open-pit mines by Guangwei Liu, Jian Lei, Zhiqing Guo, Senlin Chai, Chonghui Ren

    Published 2025-03-01
    “…In addition, this paper also adopts the amplitude-based layer adaptive sparse pruning algorithm (LAMP) to further compress the model size while maintaining efficient detection performance. Through this pruning strategy, the model further reduces its dependence on computing resources while maintaining key performance. …”
    Get full text
    Article
  5. 285

    Realizing depth measurement and edge detection based on a single metasurface by Yang Siwen, Wei Qunshuo, Zhao Ruizhe, Li Xin, Zhang Xue, Li Yao, Li Junjie, Jing Xiaoli, Li Xiaowei, Wang Yongtian, Huang Lingling

    Published 2023-07-01
    “…Double helix point source function is utilized, and three verification experiments are carried out, including double-helix beam calibration, 2D object and 3D object detection, respectively. …”
    Get full text
    Article
  6. 286

    Enhanced object detection in low-visibility haze conditions with YOLOv9s. by Yang Zhang, Bin Zhou, Xue Zhao, Xiaomeng Song

    Published 2025-01-01
    “…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
    Get full text
    Article
  7. 287

    PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels by Wang Yin, Zhao Jingyong, Xie Gang, Zhao Zhicheng, Hu Xiao

    Published 2024-01-01
    “…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
    Get full text
    Article
  8. 288

    Myoglobin expression improves T-cell metabolism and antitumor effector function by Haifeng C Xu, Diran Herebian, Ertan Mayatepek, Dirk Brenner, Aleksandra A Pandyra, Philipp A Lang, Sascha Dietrich, Julia Werner, Georgios Theodorakis, Ichiro Katahira, Mitrajit Ghosh, Michal Gorzkiewicz, Luisa de Sousa Santos, Ann Kathrin Bergmann, Max Anstötz, Anne Busch, Carsten Berndt

    Published 2025-06-01
    “…Although T cells expressing Mb exhibited increased expression of effector cytokines, PD-1 was still detected and targetable by anti-PD-1 monoclonal antibodies, which in combination with transfer of Mb-expressing T cells demonstrated maximal efficacy in delaying tumor growth.Conclusion Taken together, we show that expression of Mb in T cells can increase their metabolism, infiltration into the tumor tissue, and effector function against cancer cells.…”
    Get full text
    Article
  9. 289
  10. 290

    Application of Open-Source, Low-Code Machine-Learning Library in Python to Diagnose Parkinson's Disease Using Voice Signal Features by Daniel Hilário da Silva, Caio Tonus Ribeiro, Leandro Rodrigues da Silva Souza, Adriano Alves Pereira

    Published 2025-03-01
    “…Seventeen ML algorithms were applied to a dataset of voice recordings from Healthy Control and PD individuals, sourced from a publicly available repository. We leveraged the PyCaret Python library's ML algorithms and functions, which were introduced in this article, to demonstrate their simplicity and effectiveness in dealing with real-world data. …”
    Get full text
    Article
  11. 291

    New groups of highly divergent proteins in families as old as cellular life with important biological functions in the ocean by Duncan Sussfeld, Romain Lannes, Eduardo Corel, Guillaume Bernard, Pierre Martin, Eric Bapteste, Eric Pelletier, Philippe Lopez

    Published 2025-06-01
    “…Results Here, we used an iterative, network-based approach for remote homology detection, to probe a dataset of 40 million ORFs predicted in marine environments. …”
    Get full text
    Article
  12. 292
  13. 293

    ChiMSource improves the accuracy of studies on novel amino acid sequences by predicting alternative sources of mass spectrometry-derived peptides by Umut Çakır, Noujoud Gabed, Ali Yurtseven, Igor Kryvoruchko

    Published 2025-01-01
    “…Here, we present a highly flexible program that predicts alternative chimeric and non-chimeric sources of peptides detected by MS proteomics.…”
    Get full text
    Article
  14. 294

    Highly Efficient Biphoton Generation from Thin Dense Atomic Ensemble by Heewoo Kim, Hansol Jeong, Han Seb Moon

    Published 2025-04-01
    “…Strongly correlated bright biphotons are generated via spontaneous four‐wave mixing from a dense atomic ensemble based on the 6S1/2–6P3/2–6D5/2 transition of 133Cs. Biphoton source achieves a detected biphoton count rate of 100 kilo‐counts per second, a heralding efficiency of 15%, and a maximum normalized crosscorrelation function value of 100 between the signal and idler photons, despite the low detector efficiency of a silicon avalanche photodetector being less than 25% at 917 nm. …”
    Get full text
    Article
  15. 295

    SSB: Smart Contract Security Detection Tool Suitable for Industrial Control Scenarios by Ci Tao, Shuai He, Xingqiu Shen

    Published 2025-07-01
    “…The framework’s ability to model industrial invariants—covering security, functionality, consistency, time-related, and resource consumption aspects—provides a robust mechanism to prevent critical errors like unauthorized access or premature equipment operation. …”
    Get full text
    Article
  16. 296

    A Feature-Selective Independent Component Analysis Method for Functional MRI by Yi-Ou Li, Tülay Adali, Vince D. Calhoun

    Published 2007-01-01
    “…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
    Get full text
    Article
  17. 297

    Research on Underwater Target Detection Technology Based on SMV-YOLOv11n by Dongcheng Liao, Yijun Shen, Jinyu Ou, Yanlian Du

    Published 2025-01-01
    “…High-precision underwater object detection is a crucial component for improving the efficiency of marine resource development. …”
    Get full text
    Article
  18. 298

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…A single network is used to simultaneously recognize large-sized coal blocks, detect belt edges, and detect coal flow status. Compared with using a separate model for each task, integrating three different necks and heads into a model with a shared backbone can save a lot of computing resources and inference time. …”
    Get full text
    Article
  19. 299

    3L-YOLO: A Lightweight Low-Light Object Detection Algorithm by Zhenqi Han, Zhen Yue, Lizhuang Liu

    Published 2024-12-01
    “…Existing methods often use image enhancement to improve detection, which results in a large amount of computational resource consumption. …”
    Get full text
    Article
  20. 300

    Automatic detection of foreign object intrusion along railway tracks based on MACENet. by Xichun Chen, Yu Tian, Ming Li, Bin Lv, Shuo Zhang, Zixian Qu, Jianqing Wu, Shiya Cheng

    Published 2025-01-01
    “…Ensuring high accuracy and efficiency in foreign object intrusion detection along railway lines is critical for guaranteeing railway operational safety under limited resource conditions. …”
    Get full text
    Article