Search alternatives:
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
Showing 441 - 460 results of 1,810 for search '((( resource OR sourcess) detection function ) OR ( sources detection function ))', query time: 0.31s Refine Results
  1. 441

    Hierarchical Deep Learning Model Optimization Using Enhanced Evolutionary-based Approach for Fake News Detection by Deepti Nikumbh, Anuradha Thakare

    Published 2025-01-01
    “…It employs an enhanced genetic algorithm (GA) with a unique fitness function, dynamic crossover, and adaptive mutation strategies to achieve model compression, maintain accuracy, and balance exploration and exploitation during evolution. …”
    Get full text
    Article
  2. 442

    Improved Building Information Modeling Based Method for Prioritizing Clash Detection in the Building Construction Design Phase by Iman Bitaraf, Ali Salimpour, Pedram Elmi, Ali Akbar Shirzadi Javid

    Published 2024-11-01
    “…The proposed method substantially improves clash detection and prioritization efficiency and accuracy, yielding considerable benefits in project management and resource allocation.…”
    Get full text
    Article
  3. 443

    YOLOv10-kiwi: a YOLOv10-based lightweight kiwifruit detection model in trellised orchards by Jie Ren, Wendong Wang, Yuan Tian, Jinrong He

    Published 2025-08-01
    “…To address the challenge of real-time kiwifruit detection in trellised orchards, this paper proposes YOLOv10-Kiwi, a lightweight detection model optimized for resource-constrained devices. …”
    Get full text
    Article
  4. 444

    MDA-DETR: Enhancing Offending Animal Detection with Multi-Channel Attention and Multi-Scale Feature Aggregation by Haiyan Zhang, Huiqi Li, Guodong Sun, Feng Yang

    Published 2025-01-01
    “…Conflicts between humans and animals in agricultural and settlement areas have recently increased, resulting in significant resource loss and risks to human and animal lives. …”
    Get full text
    Article
  5. 445
  6. 446

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  7. 447

    Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber by Jiang Tang, Yongwen Tang, Kun He, Luluzi Lu, Di Zhang, Mengfan Cheng, Lei Deng, Deming Liu, Minming Zhang

    Published 2018-01-01
    “…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
    Get full text
    Article
  8. 448
  9. 449
  10. 450
  11. 451

    Enhancing Shiga toxin detection using surface plasmon resonance a study of antibody immobilization strategies by Zahra Karbalaee, Ali Hossein Rezayan, Ramezan Ali Taheri, Seyed Ali Mirhosseini, Mohammad Barshan-Tashnizi

    Published 2025-05-01
    “…The approach demonstrates particular promise for rapid, label-free detection of bacterial toxins in resource-limited settings.…”
    Get full text
    Article
  12. 452

    Implementation of a Smart Home Intruder Detection System using a Vibrometer and ESP 32 CAM by Samuel Owoeye, Folasade Durodola, Adekunle Oyelami, Racheal Oladejo, Samuel Obasuyi, Ademola Qasim, Joshua Ogundairo

    Published 2025-01-01
    “…The topic of security is quite important; hence this paper presents the development and implementation of a Smart Intruder Detection System utilizing the ESP32-CAM board, the Vibrometer and the ATMega328P microcontroller to enhance lighting, security, and surveillance functionalities. …”
    Get full text
    Article
  13. 453
  14. 454

    Performance optimization of active RIS-assisted near-shore dual-function radar communicaiton system by XU Miao, YUE Dianwu, SUN Yu, WU Xiangkai, YUAN Meng

    Published 2025-01-01
    “…To address the issues of poor communication quality, high demand for radar detection, and scarce scarcity of spectrum resources for maritime users in coastal waters, an offshore dual-function radar communication (DFRC) system assisted by a shipborne active reconfigurable intelligent surface (ARIS) was studied. …”
    Get full text
    Article
  15. 455

    Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly by Wei-Jiun Lin, Fang-Ling Chloe Liu, Lucie Cho, Chin-Cheng Scotty Yang

    Published 2025-04-01
    “…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
    Get full text
    Article
  16. 456

    Abstract 260: TCD Bubble test as a Screening tool for detection of Patent Foramen Ovale in Stroke by Danish Ahammed PK, Paul Alapatt, Aiswarya Raj, Ashraf VV, Shafeed Mattummal

    Published 2023-11-01
    “…Introduction Introduction & Objectives: Transcranial Doppler (TCD) ultrasound provides rapid, noninvasive, real‐time measures of cerebrovascular function. Patent Foramen Ovale (PFO) is fourfold more common in Young Stroke Patients <55 years of age, as opposed to age‐matched controls. …”
    Get full text
    Article
  17. 457

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
    Get full text
    Article
  18. 458
  19. 459

    Detection and classification of hypertensive retinopathy based on retinal image analysis using a deep learning approach by Bambang Krismono Triwijoyo, Ahmat Adil, Muhammad Zulfikri

    Published 2025-01-01
    “…These gap factors make the research on hypertensive retinopathy urgent since it requires an early detection model to improve treatment accuracy and prevent heart attacks and strokes before they happen. …”
    Get full text
    Article
  20. 460

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article