Showing 221 - 240 results of 1,810 for search '((( resources OR resources) detection functions ) OR ( sources detection function ))', query time: 0.32s Refine Results
  1. 221

    Improved CSW-YOLO Model for Bitter Melon Phenotype Detection by Haobin Xu, Xianhua Zhang, Weilin Shen, Zhiqiang Lin, Shuang Liu, Qi Jia, Honglong Li, Jingyuan Zheng, Fenglin Zhong

    Published 2024-11-01
    “…The diversity of bitter melon shapes has a direct impact on its market acceptance and consumer preferences, making precise identification of bitter melon germplasm resources crucial for breeding work. To address the limitations of time-consuming and less accurate traditional manual identification methods, there is a need to enhance the automation and intelligence of bitter melon phenotype detection. …”
    Get full text
    Article
  2. 222

    Fast detection method for radionuclides based on Sequential Bayesian approach by WAN Linjian, ZHANG Xuan, ZHANG Chunlei, HUANG Jianwei, LIU Jiacheng, ZHANG Xiaole, LI Dehong, YANG Zhijun

    Published 2025-01-01
    “…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
    Get full text
    Article
  3. 223

    Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis by Liang Wu, Manling Wang, Tongzhou Zhao

    Published 2020-01-01
    “…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
    Get full text
    Article
  4. 224

    Research on intrusion detection model based on improved MLP algorithm by Qihao Zhao, Fuwei Wang, Weimin Wang, Tianxin Zhang, Haodong Wu, Weijun Ning

    Published 2025-02-01
    “…These patterns can be effectively captured through MLP’s multiple nonlinear transformations, such as ReLU and Sigmoid activation functions, which are especially beneficial for intrusion detection. …”
    Get full text
    Article
  5. 225

    Transformer-based ECG classification for early detection of cardiac arrhythmias by Sunnia Ikram, Amna Ikram, Harvinder Singh, Malik Daler Ali Awan, Sajid Naveed, Isabel De la Torre Díez, Henry Fabian Gongora, Thania Candelaria Chio Montero

    Published 2025-08-01
    “…Electrocardiogram (ECG) classification plays a critical role in early detection and trocardiogram (ECG) classification plays a critical role in early detection and monitoring cardiovascular diseases. …”
    Get full text
    Article
  6. 226

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  7. 227

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  8. 228

    Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals by V. B. Manelis, I. S. Faustov, V. A. Kozmin

    Published 2025-07-01
    “…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
    Get full text
    Article
  9. 229
  10. 230

    The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables by Niccolò Veronesi, Maria Charisi, Stephen R. Taylor, Jessie Runnoe, Daniel J. D’Orazio

    Published 2025-01-01
    “…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
    Get full text
    Article
  11. 231

    Survey on key technologies for protective DNS service by MA Yongzheng, LI Hongtao, MA Zhongsheng, HU Weihong, ZHANG Zhongxian

    Published 2024-10-01
    “…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
    Get full text
    Article
  12. 232
  13. 233
  14. 234
  15. 235
  16. 236

    Randomization-Driven Hybrid Deep Learning for Diabetic Retinopathy Detection by A. M. Mutawa, G. R. Hemalakshmi, N. B. Prakash, M. Murugappan

    Published 2025-01-01
    “…This study pioneers an innovative framework, using Multi-Scale Discriminative Robust Local Binary Pattern (MS-DRLBP) features, combined with a hybrid Convolutional Neural Network-Radial Basis Function (CNN-RBF) classifier, to enhance the detection of DR. …”
    Get full text
    Article
  17. 237

    A Benchmark Review of YOLO Algorithm Developments for Object Detection by Zhengmao Hua, Kaviya Aranganadin, Cheng-Cheng Yeh, Xinhe Hai, Chen-Yun Huang, Tsan-Chuen Leung, Hua-Yi Hsu, Yung-Chiang Lan, Ming-Chieh Lin

    Published 2025-01-01
    “…You Only Look Once (YOLO) has established itself as a prominent object detection framework due to its excellent balance between speed and accuracy. …”
    Get full text
    Article
  18. 238

    Lightweight Detection Algorithm for Breast-Mass Features in Ultrasound Images by Taojuan Li, Wen Liu, Mingxian Song, Zheng Gu, Ling Hai

    Published 2025-01-01
    “…Thus, the proposed model effectively balances detection performance and lightweight design, making it well-suited for real-time applications on resource-constrained computing devices.…”
    Get full text
    Article
  19. 239

    A lightweight personnel detection method for underground coal mines by Shuai WANG, Wei YANG, Yuxiang LI, Jiaqi WU, Wei YANG

    Published 2025-04-01
    “…Introduce SIoU instead of the original loss function to accelerate model convergence. Finally, the introduction of the Ghost module to optimize the backbone network can reduce the computational and parametric quantities of the model without losing the model performance, improve the detection speed, and make the model easier to be deployed on resource-constrained devices. …”
    Get full text
    Article
  20. 240

    Detection of water surface targets based on improved Deformable DETR by Pengjiu WANG, Junbin Gong, Wei LUO, Xiao HUANG, Junjie GUO

    Published 2025-06-01
    “…Objective With technological advancements and the increasing demand for water resource exploration, water surface target detection plays a crucial role in various applications, such as ship navigation and maritime safety. …”
    Get full text
    Article