Search alternatives:
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 281 - 300 results of 1,810 for search '((( resource OR resources) detection function ) OR ( source detection function ))', query time: 0.33s Refine Results
  1. 281

    Ti3C2Tx@Pt nanocomposite based colorimetric and electrochemical dual-mode platform for glucose detection by Xuming Sun, Mingyan Zhang, Jinlong Chang, Linyan Xie, Qiongqiong Ren, Wenshuai Jiang, Zhen Jin, Shiqi Pan, Xiuli Yang, Wu Ren

    Published 2025-06-01
    “…Glucose is the main source of energy in cellular metabolism and is essential for normal cellular function and growth. …”
    Get full text
    Article
  2. 282
  3. 283

    Object detection with afordable robustness for UAV aerial imagery: model and providing method by Viacheslav Moskalenko, Artem Korobov, Yuriy Moskalenko

    Published 2024-08-01
    “…The model and method for ensuring the robustness of resource-constrained neural network systems for object detection in aerial video surveillance. …”
    Get full text
    Article
  4. 284

    Real time wire rope detection method based on Rockchip RK3588 by Mengpeng Qian, Yong Wang, Shaoqing Liu, Zhanghou Xu, Zhenshan Ji, Ming Chen, Hailong Wu, Zuchao Zhang

    Published 2025-08-01
    “…To enhance non-destructive wire rope inspection, a Mini-YOLO model was developed by integrating MobileNetV3, the Coordinate Attention (CA) mechanism, and a novel loss function, Inner-IoU, into the YOLOv8 framework. This paper’s innovation lies not in creating algorithmic components from scratch, but in their synergistic integration and targeted optimization to solve the specific challenges of real-time defect detection on resource-constrained edge devices. …”
    Get full text
    Article
  5. 285

    SGSNet: a lightweight deep learning model for strawberry growth stage detection by Zhiyu Li, Jianping Wang, Guohong Gao, Yufeng Lei, Chenping Zhao, Yan Wang, Haofan Bai, Yuqing Liu, Xiaojuan Guo, Qian Li

    Published 2024-12-01
    “…Furthermore, SGSNet has a computational cost of only 14.7 GFLOPs and a parameter count as low as 5.86 million, demonstrating an effective balance between high performance and resource efficiency.DiscussionLightweight deep learning model SGSNet not only exceeds the mainstream model in detection accuracy, but also greatly reduces the need for computing resources and is suitable for portable devices. …”
    Get full text
    Article
  6. 286

    ChiMSource improves the accuracy of studies on novel amino acid sequences by predicting alternative sources of mass spectrometry-derived peptides by Umut Çakır, Noujoud Gabed, Ali Yurtseven, Igor Kryvoruchko

    Published 2025-01-01
    “…Here, we present a highly flexible program that predicts alternative chimeric and non-chimeric sources of peptides detected by MS proteomics.…”
    Get full text
    Article
  7. 287

    Research on Underwater Target Detection Technology Based on SMV-YOLOv11n by Dongcheng Liao, Yijun Shen, Jinyu Ou, Yanlian Du

    Published 2025-01-01
    “…High-precision underwater object detection is a crucial component for improving the efficiency of marine resource development. …”
    Get full text
    Article
  8. 288

    Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection by Fahim Sufi, Musleh Alsulami

    Published 2025-05-01
    “…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
    Get full text
    Article
  9. 289
  10. 290
  11. 291

    Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms by Mehdi Ellouze

    Published 2021-01-01
    “…To this end, many research works in the literature offer users some tools that can help them take advantage of this mine of information. Community detection is one of these tools and aims to detect a set of entities that share some features within a social network. …”
    Get full text
    Article
  12. 292

    Application of Open-Source, Low-Code Machine-Learning Library in Python to Diagnose Parkinson's Disease Using Voice Signal Features by Daniel Hilário da Silva, Caio Tonus Ribeiro, Leandro Rodrigues da Silva Souza, Adriano Alves Pereira

    Published 2025-03-01
    “…Seventeen ML algorithms were applied to a dataset of voice recordings from Healthy Control and PD individuals, sourced from a publicly available repository. We leveraged the PyCaret Python library's ML algorithms and functions, which were introduced in this article, to demonstrate their simplicity and effectiveness in dealing with real-world data. …”
    Get full text
    Article
  13. 293

    An enhanced lightweight model for apple leaf disease detection in complex orchard environments by Ge Wang, Wenjie Sang, Fangqian Xu, Yuteng Gao, Yue Han, Qiang Liu

    Published 2025-03-01
    “…However, in complex natural environments, factors such as light variations, shading from branches and leaves, and overlapping disease spots often result in reduced accuracy in detecting apple diseases. To address the challenges of detecting small-target diseases on apple leaves in complex backgrounds and difficulty in mobile deployment, we propose an enhanced lightweight model, ELM-YOLOv8n.To mitigate the high consumption of computational resources in real-time deployment of existing models, we integrate the Fasternet Block into the C2f of the backbone network and neck network, effectively reducing the parameter count and the computational load of the model. …”
    Get full text
    Article
  14. 294

    3L-YOLO: A Lightweight Low-Light Object Detection Algorithm by Zhenqi Han, Zhen Yue, Lizhuang Liu

    Published 2024-12-01
    “…Existing methods often use image enhancement to improve detection, which results in a large amount of computational resource consumption. …”
    Get full text
    Article
  15. 295

    Automatic detection of foreign object intrusion along railway tracks based on MACENet. by Xichun Chen, Yu Tian, Ming Li, Bin Lv, Shuo Zhang, Zixian Qu, Jianqing Wu, Shiya Cheng

    Published 2025-01-01
    “…Ensuring high accuracy and efficiency in foreign object intrusion detection along railway lines is critical for guaranteeing railway operational safety under limited resource conditions. …”
    Get full text
    Article
  16. 296

    Rice disease detection method based on multi-scale dynamic feature fusion by Qian Fan, Runhao Chen, Bin Li

    Published 2025-05-01
    “…These optimizations enable efficient deployment on resource-constrained mobile devices, making the model highly suitable for real-time disease detection in practical agricultural scenarios where hardware limitations are critical. …”
    Get full text
    Article
  17. 297

    Video Analysis and Frame Prediction Based on Improved Object Detection and ConvGRU by Xijuan Wang, Ru Chen

    Published 2025-01-01
    “…The loss function and average accuracy mean have been improved, with a maximum detection accuracy of 0.947. …”
    Get full text
    Article
  18. 298

    An improved lightweight tiny-person detection network based on YOLOv8: IYFVMNet by Fan Yang, Lihu Pan, Hongyan Cui, Linliang Zhang

    Published 2025-04-01
    “…IntroductionIn the aviation field, drone search and rescue is a highly urgent task involving small target detection. In such a resource-constrained scenario, there are challenges of low accuracy and high computational requirements.MethodsThis paper proposes IYFVMNet, an improved lightweight detection network based on YOLOv8. …”
    Get full text
    Article
  19. 299
  20. 300

    A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks by Standy Oei, Yohanes Suyanto, Reza Pulungan

    Published 2025-01-01
    “…In the host, we employ a combination of ping Round-Trip Time (RTT) anomaly detection, the SendARP function, static entry, and ping confirmation to detect and mitigate attacks. …”
    Get full text
    Article