Search alternatives:
resource » source (Expand Search)
functions » function (Expand Search)
Showing 401 - 420 results of 2,992 for search '((( resource OR sources) detection functions ) OR ( sources selection functions ))', query time: 0.33s Refine Results
  1. 401

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  2. 402

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  3. 403

    Optimization of the defense forces personnel under mobilization conditions: The role of occupational selection as a personnel allocator by V. V. Kalnysh, A. V. Shvets

    Published 2024-12-01
    “…The proposed conceptual model of optimization of the occupational selection system in the defense forces reflects 4 main elements and functions of it. …”
    Get full text
    Article
  4. 404

    Identification of resistance sources and genomic regions regulating Septoria tritici blotch resistance in South Asian bread wheat germplasm by Manjeet Kumar, Xinyao He, Sudhir Navathe, Umesh Kamble, Madhu Patial, Pawan Kumar Singh

    Published 2025-03-01
    “…Therefore, dissection of the genetic architecture of adult‐plant resistance with genome‐wide association mapping and selection of resistant sources for adult plant STB resistance were carried out on a panel of South Asian germplasm. …”
    Get full text
    Article
  5. 405

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article
  6. 406

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  7. 407

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  8. 408

    Biphoton Waveforms of Photon Pair from Velocity‐Selective Atoms in a Doppler‐Broadened Atomic Ensemble by Hansol Jeong, Heewoo Kim, Danbi Kim, Han Seb Moon

    Published 2025-06-01
    “…Here, the beat phenomenon in the autocorrelation function of the telecom‐wavelength photon due to the velocity‐selective classes of the atoms in a Doppler‐broadened atomic ensemble of the cascade‐type 5S1/2–5P3/2–4D5/2 transition of 87Rb is reported. …”
    Get full text
    Article
  9. 409
  10. 410

    Enhancing the power quality in radial electrical systems using optimal sizing and selective allocation of distributed generations. by Bachirou Bogno, Deli Goron, Nisso Nicodem, S Shanmugan, Dieudonné Kidmo Kaoga, Kitmo, Akhlaque Ahmad Khan, Yasser Fouad, Michel Aillerie

    Published 2024-01-01
    “…Accordingly, a proposed configuration system is shown in this work to inject multiple renewable energy sources (MRES) from selected regulated nodes. The feasibility of the proposed system is evaluated using particle swarm optimization (PSO), which was used to locate stable nodes and locations, sensitive to voltage fluctuations. …”
    Get full text
    Article
  11. 411
  12. 412
  13. 413

    Cities in transition: Krakow‘s social, economic and spatial transformation within the last thirty years (selected aspects) by Anna Karwińska, Dorota Jopek, Michał Kudłacz, Michał Wiśniewski

    Published 2024-03-01
    “…Therefore, depending on the availability of statistical data, several time periods were selected and compared with each other in the most important areas of Krakow’s functioning. …”
    Get full text
    Article
  14. 414

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
    Get full text
    Article
  15. 415

    A Three-Dimensional Complex Measurement Model-Based Avionic Radio-Frequency Power Source Health Assessment Method by Lin Huo, Shiqi Li, Simiao Fei, Chuan Lyu

    Published 2020-01-01
    “…According to the function and structure characteristics of radio-frequency power source, the health characterization parameters are then obtained and the health assessment parameter system is established. …”
    Get full text
    Article
  16. 416

    Determination of selection criteria for yield traits to improve okra (Abelmoschus esculentus L. Moench) breeding in Indonesia by H. A. Reswari, M. Syukur, A. W. Ritonga, W. Nurcholis

    Published 2025-03-01
    “…Moench, commonly known as okra, is increasingly cultivated in Indonesia due to its recognition as a functional food source. Current efforts in breeding new okra varieties are focused on high productivity, yet minimal information is available regarding selection criteria. …”
    Get full text
    Article
  17. 417

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  18. 418

    An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions by Diako Mardanbegi, Andrew T. N. Kurauchi, Carlos H. Morimoto

    Published 2018-06-01
    “…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
    Get full text
    Article
  19. 419

    A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone by Junjie Liu, Qingfubo Geng, Zhaoxin Geng

    Published 2024-08-01
    “…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
    Get full text
    Article
  20. 420

    Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning by Bingyi Liu, Anqi Wang, Chengqian Xia

    Published 2025-01-01
    “…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as “black boxes” that limit their practical utility. …”
    Get full text
    Article