Search alternatives:
resource » source (Expand Search)
Showing 341 - 360 results of 2,992 for search '((( resource OR sources) detection function ) OR ( sources selection function ))', query time: 0.39s Refine Results
  1. 341

    A lightweight personnel detection method for underground coal mines by Shuai WANG, Wei YANG, Yuxiang LI, Jiaqi WU, Wei YANG

    Published 2025-04-01
    “…Introduce SIoU instead of the original loss function to accelerate model convergence. Finally, the introduction of the Ghost module to optimize the backbone network can reduce the computational and parametric quantities of the model without losing the model performance, improve the detection speed, and make the model easier to be deployed on resource-constrained devices. …”
    Get full text
    Article
  2. 342

    Introduction of AI Technology for Objective Physical Function Assessment by Nobuji Kouno, Satoshi Takahashi, Masaaki Komatsu, Yusuke Sakaguchi, Naoaki Ishiguro, Katsuji Takeda, Kyoko Fujioka, Ayumu Matsuoka, Maiko Fujimori, Ryuji Hamamoto

    Published 2024-11-01
    “…This paper explored how artificial intelligence (AI) could predict physical function scores from various patient data sources and reviewed methods to measure objective physical function using this technology. …”
    Get full text
    Article
  3. 343

    Dynamic Risk Assessment System for Power System Based on Multi-source Information of the Ubiquitous Power Internet of Things by Shenhua WANG, Xiangwei HE, Xiaofang FANG, Bingsong CHEN, Chuangxin GUO

    Published 2019-12-01
    “…Finally, based on the architecture, the corresponding software system is designed. The data source, data platform and main function modules of the system are also described. …”
    Get full text
    Article
  4. 344

    A Two-Step Method for Impact Source Localization in Operational Water Pipelines Using Distributed Acoustic Sensing by Haonan Wei, Yi Liu, Zejia Hao

    Published 2025-08-01
    “…STEE is introduced as a stable metric to quantify signal impulsiveness and guides the selection of the relevant intrinsic mode function. …”
    Get full text
    Article
  5. 345
  6. 346

    A Benchmark Review of YOLO Algorithm Developments for Object Detection by Zhengmao Hua, Kaviya Aranganadin, Cheng-Cheng Yeh, Xinhe Hai, Chen-Yun Huang, Tsan-Chuen Leung, Hua-Yi Hsu, Yung-Chiang Lan, Ming-Chieh Lin

    Published 2025-01-01
    “…You Only Look Once (YOLO) has established itself as a prominent object detection framework due to its excellent balance between speed and accuracy. …”
    Get full text
    Article
  7. 347

    Lightweight detection algorithms for small targets on unmanned mining trucks by Shuoqi CHENG, Yilihamu·YAERMAIMAITI, Lirong XIE, Xiyu LI, Ying MA

    Published 2025-07-01
    “…Accurate target category detection is a prerequisite for obstacle avoidance decisions, and model lightweighting facilitates deployment in resource-limited conditions. …”
    Get full text
    Article
  8. 348

    Fast detection method for radionuclides based on Sequential Bayesian approach by WAN Linjian, ZHANG Xuan, ZHANG Chunlei, HUANG Jianwei, LIU Jiacheng, ZHANG Xiaole, LI Dehong, YANG Zhijun

    Published 2025-01-01
    “…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
    Get full text
    Article
  9. 349

    Advances in preparation and application of coal-based functional nanomaterials by Shenyong LI, Shenjun QIN, Changquan MEN, Jiajia HOU, Dawei LYU, Xue ZHENG, Wei PANG, Longlong HAO, Daoyuan ZHAO, Shaozhuo ZHANG

    Published 2025-07-01
    “…China’s energy resource endowment, characterized by “abundant coal but scarce oil”, establishes coal’s fundamental role in the national energy system. …”
    Get full text
    Article
  10. 350

    Research on intrusion detection model based on improved MLP algorithm by Qihao Zhao, Fuwei Wang, Weimin Wang, Tianxin Zhang, Haodong Wu, Weijun Ning

    Published 2025-02-01
    “…These patterns can be effectively captured through MLP’s multiple nonlinear transformations, such as ReLU and Sigmoid activation functions, which are especially beneficial for intrusion detection. …”
    Get full text
    Article
  11. 351
  12. 352

    Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis by Liang Wu, Manling Wang, Tongzhou Zhao

    Published 2020-01-01
    “…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
    Get full text
    Article
  13. 353

    A rapid and accurate method for Helicobacter pylori detection via integrating LAMP assay with CRISPR/Cas12b detection by one-step in one-pot by Yeqian Zhang, Tao Liu, Puhua Zhang, Bo Ni, Xingang Wang, Long Bai, Wei Sun, Yujing Guan, Xiang Xia, Hui Cao, Jiayi Gu

    Published 2025-08-01
    “…Conventional diagnostic methods, such as PCR and culture, require specialized equipment and expertise, limiting their applicability in resource-limited settings. There is a pressing need for a rapid, cost-effective, and user-friendly diagnostic platform for HP detection, particularly in point-of-care settings.MethodsWe developed an integrated detection platform combining loop-mediated isothermal amplification (LAMP) with the CRISPR/Cas12b system in a single, one-step, one-pot reaction. …”
    Get full text
    Article
  14. 354
  15. 355

    Characteristics and Source-specific Health Risks of Ambient PM2.5-bound PAHs in an Urban City of Northern Taiwan by Yu-Chieh Ting, Chun-Hung Ku, Yu-Xuan Zou, Kai-Hsien Chi, Jhy-Charm Soo, Chin-Yu Hsu, Yu-Cheng Chen

    Published 2023-08-01
    “…We utilized a positive matrix factorization (PMF) model, diagnostic ratios, and potential source contribution function (PSCF) to identify the origins of PM2.5-bound PAHs. …”
    Get full text
    Article
  16. 356

    Data‐Driven Materials Research and Development for Functional Coatings by Kai Xu, Xuelian Xiao, Linjing Wang, Ming Lou, Fangming Wang, Changheng Li, Hui Ren, Xue Wang, Keke Chang

    Published 2024-11-01
    “…In this paper, recent advances in data‐driven materials research and development (R&D) for functional coatings, highlighting the importance, data sources, working processes, and applications of this paradigm are summarized. …”
    Get full text
    Article
  17. 357

    Enhancing Antioxidant Benefits of Kombucha Through Optimized Glucuronic Acid by Selected Symbiotic Fermentation Culture by Yu-Chieh Chou, Hui-Wen Lin, Chung-Yi Wang, Chen-Che Hsieh, Shella Permatasari Santoso, Shin-Ping Lin, Kuan-Chen Cheng

    Published 2024-10-01
    “…To optimize the glucuronic acid content in kombucha, various strain combinations by selecting fermented sources were accomplished. According to the experimental results, kombucha produced through co-fermentation with <i>Pichia anomala</i> and <i>Komagataeibacter hansenii</i>, with glucose-added black tea as the carbon source, exhibited the highest glucuronic acid production. …”
    Get full text
    Article
  18. 358

    First Principles Calculation Guided Material Selection of Poly(propylenemonothiocarbonate) for High-Performance Triboelectric Nanogenerators by Muhammad Naeem Shah, Jiaqi Lu, Dinku Hazarika, Munir Ullah Khan, Srinivasa Rao Pathipati, Kaihang Zhang, Liangquan Xu, Jie Li, Xiaozhi Wang, Shurong Dong, Jikui Luo

    Published 2025-01-01
    “…Density functional theory analysis revealed that PPMNTC exhibits superior electron-donating capabilities due to the existence of high contents of thiol and methoxy groups. …”
    Get full text
    Article
  19. 359

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  20. 360

    Transformer-based ECG classification for early detection of cardiac arrhythmias by Sunnia Ikram, Amna Ikram, Harvinder Singh, Malik Daler Ali Awan, Sajid Naveed, Isabel De la Torre Díez, Henry Fabian Gongora, Thania Candelaria Chio Montero

    Published 2025-08-01
    “…Electrocardiogram (ECG) classification plays a critical role in early detection and trocardiogram (ECG) classification plays a critical role in early detection and monitoring cardiovascular diseases. …”
    Get full text
    Article