Showing 461 - 480 results of 1,810 for search '((( resource OR source) detection functions ) OR ( sources detection function ))', query time: 0.33s Refine Results
  1. 461

    Radar Detection Simulation by Digital Twins of Target and Antenna System by A. S. Grigoriev, A. A. Kazantsev, A. M. Terentyev, B. S. Stavtsev

    Published 2025-03-01
    “…The signal-to-noise dynamic dependence of the given radar system, space object, and observation scenario, presented by their digital models, was calculated. The function of detection probability density was calculated, which demonstrated an insufficient detection capacity of a radar system in the case of observation of such type of objects.Conclusion. …”
    Get full text
    Article
  2. 462

    Improved CSW-YOLO Model for Bitter Melon Phenotype Detection by Haobin Xu, Xianhua Zhang, Weilin Shen, Zhiqiang Lin, Shuang Liu, Qi Jia, Honglong Li, Jingyuan Zheng, Fenglin Zhong

    Published 2024-11-01
    “…The diversity of bitter melon shapes has a direct impact on its market acceptance and consumer preferences, making precise identification of bitter melon germplasm resources crucial for breeding work. To address the limitations of time-consuming and less accurate traditional manual identification methods, there is a need to enhance the automation and intelligence of bitter melon phenotype detection. …”
    Get full text
    Article
  3. 463
  4. 464
  5. 465

    A lightweight object detection approach based on edge computing for mining industry by Muhammad Wahab Hanif, Zhanli Li, Zhenhua Yu, Rehmat Bashir

    Published 2024-11-01
    “…These enhancements enable more accurate and efficient detection in resource‐constrained edge environments, contributing to safer and more reliable monitoring in coal mining operations.…”
    Get full text
    Article
  6. 466

    Survey on key technologies for protective DNS service by MA Yongzheng, LI Hongtao, MA Zhongsheng, HU Weihong, ZHANG Zhongxian

    Published 2024-10-01
    “…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
    Get full text
    Article
  7. 467

    Rapid urban health security assessment tool: a new resource for evaluating local-level public health preparedness by Rebecca Katz, Matthew R Boyce

    Published 2020-06-01
    “…Plans and policies for responding to public health emergencies are generally framed at higher levels of governance, but developing, improving and sustaining the capacities necessary for implementing these policies is a direct function of local-level authorities. Evaluating local-level public health capacities is an important process for identifying strengths and weaknesses that can impact the preparedness for, detection of and response to health security threats. …”
    Get full text
    Article
  8. 468

    MeStanG—Resource for High-Throughput Sequencing Standard Data Sets Generation for Bioinformatic Methods Evaluation and Validation by Daniel Ramos Lopez, Francisco J. Flores, Andres S. Espindola

    Published 2025-01-01
    “…Metagenomics analysis has enabled the measurement of the microbiome diversity in environmental samples without prior targeted enrichment. Functional and phylogenetic studies based on microbial diversity retrieved using HTS platforms have advanced from detecting known organisms and discovering unknown species to applications in disease diagnostics. …”
    Get full text
    Article
  9. 469

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  10. 470

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  11. 471
  12. 472

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
    Get full text
    Article
  13. 473

    Discrimination of mercury, cadmium and lead polluted rice leaves based on near infrared spectroscopy technology by ZHANG Long, PAN Jiarong, ZHU Cheng

    Published 2013-01-01
    “…There are hundreds of sources of heavy metal pollution, including the industries of coal, natural gas, paper, and mining. …”
    Get full text
    Article
  14. 474

    A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone by Junjie Liu, Qingfubo Geng, Zhaoxin Geng

    Published 2024-08-01
    “…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
    Get full text
    Article
  15. 475

    Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning by Bingyi Liu, Anqi Wang, Chengqian Xia

    Published 2025-01-01
    “…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as “black boxes” that limit their practical utility. …”
    Get full text
    Article
  16. 476

    Water quality anomaly detection research based on GRU-PINN model by Zhao Xinyu

    Published 2025-01-01
    “…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
    Get full text
    Article
  17. 477

    Optimization of train obstacle detection based on zone media controller unit by ZHOU Liming, HU Jiaqiao, SHEN Tuo

    Published 2024-11-01
    “…In addition, the need for comprehensive train detection including pantograph-catenary systems and running gears, lead to an increased number of on-board devices, resulting in fewer computational resources available for each detection system, and complicating equipment installation and maintenance. …”
    Get full text
    Article
  18. 478

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article
  19. 479

    SR-DETR: Target Detection in Maritime Rescue from UAV Imagery by Yuling Liu, Yan Wei

    Published 2025-06-01
    “…These outcomes highlight the practicality and reliability of our method in detecting individuals overboard, contributing to more precise and resource-efficient solutions for real-time maritime rescue efforts.…”
    Get full text
    Article
  20. 480

    SWMD-YOLO: A Lightweight Model for Tomato Detection in Greenhouse Environments by Quan Wang, Ye Hua, Qiongdan Lou, Xi Kan

    Published 2025-06-01
    “…This study proposes SWMD-YOLO, a lightweight multi-scale detection network optimized for greenhouse scenarios. …”
    Get full text
    Article