Search alternatives:
resource » source (Expand Search)
Showing 41 - 60 results of 2,685 for search '((( resource OR success) detection functions ) OR ( sources detection function ))', query time: 0.40s Refine Results
  1. 41

    High SERS performance of functionalized carbon dots in the detection of dye contaminants by Yanqiu Yang, Lingru Kong, Yong Ding, Lixin Xia, Shuo Cao, Peng Song

    Published 2025-02-01
    “…Methods: The enhanced substrate used for the detection of MG has been successfully constructed using PBA modulated Ag-CDs on a structured surface with rich binding sites. …”
    Get full text
    Article
  2. 42
  3. 43
  4. 44
  5. 45

    Sustainable Valorization of Jackfruit Peel Waste: Bio‐Functional and Structural Characterization by Rangina Brahma, Subhajit Ray, Prakash Kumar Nayak, Kandi Shridhar

    Published 2025-03-01
    “…ABSTRACT The sustainable utilization of agricultural waste holds immense promise in addressing environmental concerns and promoting resource efficiency. In this context, jackfruit (Artocarpus heterophyllus) peel waste emerges as a valuable yet underexplored resource. …”
    Get full text
    Article
  6. 46

    Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection by Ali Nizam, Ertugrul Islamoglu, Omer Kerem Adali, Musa Aydin

    Published 2025-01-01
    “…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
    Get full text
    Article
  7. 47
  8. 48

    Improved UAV Target Detection Model for RT-DETR by Yong He, Yufan Pang, Guolin Ou, Renfeng Xiao, Yifan Tang

    Published 2025-01-01
    “…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
    Get full text
    Article
  9. 49

    Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs by Yan LI, Weizhong QIANG, Zhen LI, Deqing ZOU, Hai JIN

    Published 2023-12-01
    “…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
    Get full text
    Article
  10. 50

    Detecting and routing of dust event using remote sensing and numerical modeling in Isfahan Province by Mehdii Jafari, Gholamreza Zehtabian, Hasan Ahmadi, Tayebeh Mesbahzadeh, Ali Akbar Norouzi

    Published 2020-03-01
    “…In addition, numerical weather models alone are not capable of storm detection, which requires the use of dust detection methods based on data remote sensing. …”
    Get full text
    Article
  11. 51

    A powerful molecular marker to detect mutations at sorghum LOW GERMINATION STIMULANT 1 by Adedayo O. Adeyanju, Patrick J. Rich, Gebisa Ejeta

    Published 2025-03-01
    “…The LGS1 marker is useful for both detecting sources of lgs1 and introgressing Striga resistance into new genetic backgrounds.…”
    Get full text
    Article
  12. 52

    Analytical method for determining coordinates of the radiation source in a homogeneous medium by H. V. Velichko

    Published 2015-12-01
    “…The problem is reduced to finding the minimum of a nonlinear function of five variables. This function is the sum of the squares of the differences of the calculated and the actual time of the wave front passing through the sensor for each of the sensors. …”
    Get full text
    Article
  13. 53

    Performance of Fitness Functions Based on Natural Frequencies in Defect Detection Using the Standard PSO-FEM Approach by Xiao-Lin Li, Roger Serra, Julien Olivier

    Published 2021-01-01
    “…In this process, the fitness function is a critical factor in the success of the PSO-FEM approach. …”
    Get full text
    Article
  14. 54

    Using an ensemble approach to predict habitat of Dusky Grouse ( Dendragapus obscurus ) in Montana, USA by Elizabeth A Leipold, Claire N Gower, Lance McNew

    Published 2024-12-01
    “…Consensus between the resource selection function and random forest models was high (93%) and the ensemble map had higher predictive accuracy when classifying the independent dataset than the other two models. …”
    Get full text
    Article
  15. 55
  16. 56

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  17. 57

    Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples by Maytawan Thanunchai, Sirikwan Sangboonruang, Natthawat Semakul, Kattareeya Kumthip, Niwat Maneekarn, Khajornsak Tragoolpua

    Published 2025-06-01
    “…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
    Get full text
    Article
  18. 58

    Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis by Rati Bhan, Parvez Faruki, Rajendra Pamula

    Published 2025-01-01
    “…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
    Get full text
    Article
  19. 59
  20. 60

    Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China by Bingkun Wang, Zhiyuan Liu, Jiangbo Xi, Siyan Gao, Ming Cong, Haixing Shang

    Published 2025-05-01
    “…The large-scale detection of greenhouses and rural buildings is important for natural resource surveys and farmland protection. …”
    Get full text
    Article