-
321
Toward global rooftop PV detection with Deep Active Learning
Published 2024-12-01“…It is crucial to know the location of rooftop PV systems to monitor the regional progress toward sustainable societies and to ensure the integration of decentralized energy resources into the electricity grid. However, locations of PV are often unknown, which is why a large number of studies have proposed variants of Deep Learning to detect PV panels in remote sensing data using supervised Deep Learning. …”
Get full text
Article -
322
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
Get full text
Article -
323
A Lightweight Citrus Object Detection Method in Complex Environments
Published 2025-05-01“…Aiming at the limitations of current citrus detection methods in complex orchard environments, especially the problems of poor model adaptability and high computational complexity under different lighting, multiple occlusions, and dense fruit conditions, this study proposes an improved citrus detection model, YOLO-PBGM, based on You Only Look Once v7 (YOLOv7). …”
Get full text
Article -
324
Radar Detection Simulation by Digital Twins of Target and Antenna System
Published 2025-03-01“…The signal-to-noise dynamic dependence of the given radar system, space object, and observation scenario, presented by their digital models, was calculated. The function of detection probability density was calculated, which demonstrated an insufficient detection capacity of a radar system in the case of observation of such type of objects.Conclusion. …”
Get full text
Article -
325
Detection of Electric Network Frequency in Audio Using Multi-HCNet
Published 2025-06-01“…With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology. However, high-pass filtering operations commonly employed in modern communication scenarios, while effectively removing infrasound to enhance communication quality at reduced costs, result in a substantial loss of fundamental frequency information, thereby degrading the performance of existing detection methods. …”
Get full text
Article -
326
Improved CSW-YOLO Model for Bitter Melon Phenotype Detection
Published 2024-11-01“…The diversity of bitter melon shapes has a direct impact on its market acceptance and consumer preferences, making precise identification of bitter melon germplasm resources crucial for breeding work. To address the limitations of time-consuming and less accurate traditional manual identification methods, there is a need to enhance the automation and intelligence of bitter melon phenotype detection. …”
Get full text
Article -
327
Distribution and functional significance of KLF15 in mouse cerebellum
Published 2025-01-01Get full text
Article -
328
A lightweight object detection approach based on edge computing for mining industry
Published 2024-11-01“…These enhancements enable more accurate and efficient detection in resource‐constrained edge environments, contributing to safer and more reliable monitoring in coal mining operations.…”
Get full text
Article -
329
Detection of the Trajectories of Moving Rectilinearly Air Targets in the Secondary Processing of Radar Information
Published 2019-12-01“…Introduction. The primary functions of secondary processing of radar information are to detect and maintain the trajectories of air targets (AT). …”
Get full text
Article -
330
-
331
Optimized decomposition and identification method for multiple power quality disturbances
Published 2024-11-01Get full text
Article -
332
Rapid urban health security assessment tool: a new resource for evaluating local-level public health preparedness
Published 2020-06-01“…Plans and policies for responding to public health emergencies are generally framed at higher levels of governance, but developing, improving and sustaining the capacities necessary for implementing these policies is a direct function of local-level authorities. Evaluating local-level public health capacities is an important process for identifying strengths and weaknesses that can impact the preparedness for, detection of and response to health security threats. …”
Get full text
Article -
333
Reduced graphene oxide-based electrochemical aptasensor for the multiplexed detection of imidacloprid, thiamethoxam, and clothianidin in food samples
Published 2025-03-01“…Nonetheless, no aptasensor was reported for the multiplexed detection of neonicotinoids. Herein, a graphene-based electrochemical biosensor was fabricated with three aptamers for the detection of imidacloprid, thiamethoxam, and clothianidin. …”
Get full text
Article -
334
MeStanG—Resource for High-Throughput Sequencing Standard Data Sets Generation for Bioinformatic Methods Evaluation and Validation
Published 2025-01-01“…Metagenomics analysis has enabled the measurement of the microbiome diversity in environmental samples without prior targeted enrichment. Functional and phylogenetic studies based on microbial diversity retrieved using HTS platforms have advanced from detecting known organisms and discovering unknown species to applications in disease diagnostics. …”
Get full text
Article -
335
Survey on key technologies for protective DNS service
Published 2024-10-01“…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
Get full text
Article -
336
Cheating Detection in Online Exams Using Deep Learning and Machine Learning
Published 2025-01-01“…In the regression analysis conducted within the scope of Scenario-1, the model we proposed to detect “cheating” behavior, which is one of the unethical learner behaviors, was found to be a 5-layer DNN model with a test performance success of 80.9%. …”
Get full text
Article -
337
TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code
Published 2025-01-01“…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
Get full text
Article -
338
Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks
Published 2025-07-01“…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
Get full text
Article -
339
High-Sensitivity, Low Detection Limit, and Fast Ammonia Detection of Ag-NiFe<sub>2</sub>O<sub>4</sub> Nanocomposite and DFT Study
Published 2025-07-01“…This study facilitates the rapid detection of food spoilage and promotes the development of portable food safety detection devices.…”
Get full text
Article -
340
Advances in the detection of virulence genes of Staphylococcus aureus originate from food
Published 2020-03-01Get full text
Article