Search alternatives:
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
Showing 41 - 60 results of 1,810 for search '((( resource OR resourcess) detection functions ) OR ( source detection function ))', query time: 0.28s Refine Results
  1. 41

    Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China by Bingkun Wang, Zhiyuan Liu, Jiangbo Xi, Siyan Gao, Ming Cong, Haixing Shang

    Published 2025-05-01
    “…The large-scale detection of greenhouses and rural buildings is important for natural resource surveys and farmland protection. …”
    Get full text
    Article
  2. 42

    Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples by Maytawan Thanunchai, Sirikwan Sangboonruang, Natthawat Semakul, Kattareeya Kumthip, Niwat Maneekarn, Khajornsak Tragoolpua

    Published 2025-06-01
    “…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
    Get full text
    Article
  3. 43

    AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11. by Rui He, Dezhi Han, Xiang Shen, Bing Han, Zhongdai Wu, Xiaohu Huang

    Published 2025-01-01
    “…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
    Get full text
    Article
  4. 44

    Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis by Rati Bhan, Parvez Faruki, Rajendra Pamula

    Published 2025-01-01
    “…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
    Get full text
    Article
  5. 45

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  6. 46

    The Cosmic Evolution of Fast Radio Bursts Inferred from the CHIME/FRB Baseband Catalog 1 by Om Gupta, Paz Beniamini, Pawan Kumar, Steven L. Finkelstein

    Published 2025-01-01
    “…We find the energy distribution is described well by a Schechter function with a power-law slope of $-1.9{4}_{-0.12}^{+0.14}$ . …”
    Get full text
    Article
  7. 47
  8. 48

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  9. 49

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  10. 50

    Integrated Machine Learning and Region Growing Algorithms for Enhanced Concrete Crack Detection: A Novel Approach by Wenxuan Yao, Hui Li, Yanlin Li

    Published 2024-10-01
    “…Firstly, the regression method learns the image features of the dataset and the specific region growth threshold, and the regression function is trained by using the open-source dataset to determine the region growth threshold using the characteristics of the images included in the tests. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  17. 57

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  18. 58

    A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm by Zhaotao Yan, Zhaofa Zeng, Jianwei Zhao

    Published 2025-06-01
    “…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
    Get full text
    Article
  19. 59

    Research Progress on Dual Function Radar and Communication Signal Design and its Application in Typical Detection Scenarios by Yaping HE, Longfei SHI, Dong WANG, Jianglan TANG, Junxian CHEN, Jiazhi MA, Jialei LIU

    Published 2025-08-01
    “…Dual Function Radar and Communication (DFRC)-integrated electronic equipment platform, which combines detection and communication functions, effectively addresses issues such as platform limitations, resource constraints, and electromagnetic compatibility by sharing hardware platforms and transmitting waveforms. …”
    Get full text
    Article
  20. 60

    SFD-YOLO: A novel framework for subsidence funnels detection in China based on large-scale SAR interferograms by Jing Guo, Zhengjia Zhang, Peifeng Ma, Mengmeng Wang, Xuefei Zhang, Dongdong Li, Bing Sui

    Published 2025-06-01
    “…The model incorporates the DWR-C2f module, which enhances multi-scale feature extraction and significantly improves the detection of small-sized subsidence funnels. Additionally, the innovative Inner-WIoU regression loss function improves the localization accuracy of detection boxes while also alleviates the imbalance between hard and easy samples. …”
    Get full text
    Article