Search alternatives:
resource » source (Expand Search)
functions » function (Expand Search)
Showing 361 - 380 results of 2,992 for search '((( resource OR sources) detection functions ) OR ( sources selection functions ))', query time: 0.35s Refine Results
  1. 361

    A Benchmark Review of YOLO Algorithm Developments for Object Detection by Zhengmao Hua, Kaviya Aranganadin, Cheng-Cheng Yeh, Xinhe Hai, Chen-Yun Huang, Tsan-Chuen Leung, Hua-Yi Hsu, Yung-Chiang Lan, Ming-Chieh Lin

    Published 2025-01-01
    “…You Only Look Once (YOLO) has established itself as a prominent object detection framework due to its excellent balance between speed and accuracy. …”
    Get full text
    Article
  2. 362

    Lightweight detection algorithms for small targets on unmanned mining trucks by Shuoqi CHENG, Yilihamu·YAERMAIMAITI, Lirong XIE, Xiyu LI, Ying MA

    Published 2025-07-01
    “…Accurate target category detection is a prerequisite for obstacle avoidance decisions, and model lightweighting facilitates deployment in resource-limited conditions. …”
    Get full text
    Article
  3. 363

    Fast detection method for radionuclides based on Sequential Bayesian approach by WAN Linjian, ZHANG Xuan, ZHANG Chunlei, HUANG Jianwei, LIU Jiacheng, ZHANG Xiaole, LI Dehong, YANG Zhijun

    Published 2025-01-01
    “…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
    Get full text
    Article
  4. 364

    Feature selection using a multi-strategy improved parrot optimization algorithm in software defect prediction by Qi Fei, Guisheng Yin, Zhian Sun

    Published 2025-04-01
    “…Finally, to further enhance the classification performance of defect prediction, a heterogeneous data stacking ensemble learning algorithm (HEDSE) based on feature selection is proposed. Experimental evaluations on 16 open-source software defect datasets indicate that the proposed HEDSE outperforms existing methods, providing a novel and effective solution for software defect prediction. …”
    Get full text
    Article
  5. 365

    MDV ClimEx: An open-source tool for exploring climate anomalies in the McMurdo Dry Valleys of Antarctica by Renée F. Brown, Gavin P. Wagner

    Published 2025-12-01
    “…Here, we introduce MDV ClimEx, an open-source, interactive web application designed for user-driven exploration of long-term meteorological records from the MDVs. …”
    Get full text
    Article
  6. 366

    IMPLEMENTATION OF LEARNING MANAGEMENT SYSTEMS WITH GENERATIVE ARTIFICIAL INTELLIGENCE FUNCTIONS IN THE POST-PANDEMIC ENVIRONMENT by Denis-Cătălin Arghir

    Published 2024-04-01
    “…The system goes beyond traditional LMS functionalities by providing suggestions to enhance and diversify lessons. …”
    Get full text
    Article
  7. 367

    Dynamic Risk Assessment System for Power System Based on Multi-source Information of the Ubiquitous Power Internet of Things by Shenhua WANG, Xiangwei HE, Xiaofang FANG, Bingsong CHEN, Chuangxin GUO

    Published 2019-12-01
    “…Finally, based on the architecture, the corresponding software system is designed. The data source, data platform and main function modules of the system are also described. …”
    Get full text
    Article
  8. 368

    A Two-Step Method for Impact Source Localization in Operational Water Pipelines Using Distributed Acoustic Sensing by Haonan Wei, Yi Liu, Zejia Hao

    Published 2025-08-01
    “…STEE is introduced as a stable metric to quantify signal impulsiveness and guides the selection of the relevant intrinsic mode function. …”
    Get full text
    Article
  9. 369

    A Self-Adaptive Particle Swarm Optimization Based Multiple Source Localization Algorithm in Binary Sensor Networks by Long Cheng, Yan Wang, Shuai Li

    Published 2015-08-01
    “…Then the maximum likelihood estimator is employed to establish the objective function which is used to estimate the location of sources. …”
    Get full text
    Article
  10. 370

    Detection of water surface targets based on improved Deformable DETR by Pengjiu WANG, Junbin Gong, Wei LUO, Xiao HUANG, Junjie GUO

    Published 2025-06-01
    “…Objective With technological advancements and the increasing demand for water resource exploration, water surface target detection plays a crucial role in various applications, such as ship navigation and maritime safety. …”
    Get full text
    Article
  11. 371
  12. 372

    Multivariate GWAS analysis reveals loci associated with liver functions in continental African populations. by Chisom Soremekun, Tafadzwa Machipisa, Opeyemi Soremekun, Fraser Pirie, Nashiru Oyekanmi, Ayesha A Motala, Tinashe Chikowore, Segun Fatumo

    Published 2023-01-01
    “…<h4>Conclusions</h4>Using multivariate GWAS method improves the power to detect novel genotype-phenotype associations for liver functions not found with the standard univariate GWAS in the same dataset.…”
    Get full text
    Article
  13. 373

    A rapid and accurate method for Helicobacter pylori detection via integrating LAMP assay with CRISPR/Cas12b detection by one-step in one-pot by Yeqian Zhang, Tao Liu, Puhua Zhang, Bo Ni, Xingang Wang, Long Bai, Wei Sun, Yujing Guan, Xiang Xia, Hui Cao, Jiayi Gu

    Published 2025-08-01
    “…Conventional diagnostic methods, such as PCR and culture, require specialized equipment and expertise, limiting their applicability in resource-limited settings. There is a pressing need for a rapid, cost-effective, and user-friendly diagnostic platform for HP detection, particularly in point-of-care settings.MethodsWe developed an integrated detection platform combining loop-mediated isothermal amplification (LAMP) with the CRISPR/Cas12b system in a single, one-step, one-pot reaction. …”
    Get full text
    Article
  14. 374
  15. 375

    Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis by Liang Wu, Manling Wang, Tongzhou Zhao

    Published 2020-01-01
    “…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
    Get full text
    Article
  16. 376

    Characteristics and Source-specific Health Risks of Ambient PM2.5-bound PAHs in an Urban City of Northern Taiwan by Yu-Chieh Ting, Chun-Hung Ku, Yu-Xuan Zou, Kai-Hsien Chi, Jhy-Charm Soo, Chin-Yu Hsu, Yu-Cheng Chen

    Published 2023-08-01
    “…We utilized a positive matrix factorization (PMF) model, diagnostic ratios, and potential source contribution function (PSCF) to identify the origins of PM2.5-bound PAHs. …”
    Get full text
    Article
  17. 377

    Assessment of the capacity of health facilities in preventing and managing non-communicable diseases in selected regions of Somaliland by Opeolu O. Ojo, Omar O Hersi, Ayodele A Falobi, Nura Ali, Lawrence Tan, Yusuf A. Ali

    Published 2025-05-01
    “…The survey focused on assessing the capacity of selected hospitals in detecting and managing NCDs by collecting data on the availability of health workers, equipment, screening and management services, medications, and laboratory tests. …”
    Get full text
    Article
  18. 378

    A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells by Yang Yang, Jing Zhang, Xin Shu, Lei Pan, Ming Zhang

    Published 2024-01-01
    “…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
    Get full text
    Article
  19. 379

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  20. 380

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article