Search alternatives:
functions » function (Expand Search)
resources » resourcess (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resources » resourcess (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
-
241
Survey on key technologies for protective DNS service
Published 2024-10-01“…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
Get full text
Article -
242
Anisotropic Diffusion of e± in Pulsar Halos over Multiple Coherence of Magnetic Fields
Published 2025-01-01“…Also, the halo’s morphology may appear less asymmetric, especially after being smoothed by the point-spread function of instruments. This largely relaxes the tension between the asymmetric morphology of halos predicted by the model and the lack of apparent asymmetric halos detected so far. …”
Get full text
Article -
243
Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis
Published 2020-01-01“…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
Get full text
Article -
244
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
Get full text
Article -
245
Fast detection method for radionuclides based on Sequential Bayesian approach
Published 2025-01-01“…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
Get full text
Article -
246
A lightweight object detection approach based on edge computing for mining industry
Published 2024-11-01“…These enhancements enable more accurate and efficient detection in resource‐constrained edge environments, contributing to safer and more reliable monitoring in coal mining operations.…”
Get full text
Article -
247
The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables
Published 2025-01-01“…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
Get full text
Article -
248
-
249
Soil Moisture Time Series Using Gamma‐Ray Spectrometry Detection Representing a Scale of Tens‐of‐Meters
Published 2025-06-01Get full text
Article -
250
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article -
251
Optimization of train obstacle detection based on zone media controller unit
Published 2024-11-01“…In addition, the need for comprehensive train detection including pantograph-catenary systems and running gears, lead to an increased number of on-board devices, resulting in fewer computational resources available for each detection system, and complicating equipment installation and maintenance. …”
Get full text
Article -
252
Water quality anomaly detection research based on GRU-PINN model
Published 2025-01-01“…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
Get full text
Article -
253
TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code
Published 2025-01-01“…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
Get full text
Article -
254
Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions
Published 2025-01-01“…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
Get full text
Article -
255
Automated quantification reveals hyperglycemia inhibits endothelial angiogenic function.
Published 2014-01-01Get full text
Article -
256
Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks
Published 2025-07-01“…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
Get full text
Article -
257
Advances in the detection of virulence genes of Staphylococcus aureus originate from food
Published 2020-03-01Get full text
Article -
258
Improving dependability with low power fault detection model for skinny-hash.
Published 2024-01-01“…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
Get full text
Article -
259
A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone
Published 2024-08-01“…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
Get full text
Article -
260
Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning
Published 2025-01-01“…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as “black boxes” that limit their practical utility. …”
Get full text
Article