-
261
DEM-based topographic change detection considering the spatial distribution of errors
Published 2025-03-01Get full text
Article -
262
A Universal Tire Detection Method Based on Improved YOLOv8
Published 2024-01-01“…However, traditional methods of tire defect detection have encountered problems such as slow detection speed, complex tire defect backgrounds, and limited hardware resources. …”
Get full text
Article -
263
Lightweight obstacle detection for unmanned mining trucks in open-pit mines
Published 2025-03-01“…In addition, this paper also adopts the amplitude-based layer adaptive sparse pruning algorithm (LAMP) to further compress the model size while maintaining efficient detection performance. Through this pruning strategy, the model further reduces its dependence on computing resources while maintaining key performance. …”
Get full text
Article -
264
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article -
265
An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions
Published 2018-06-01“…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
Get full text
Article -
266
TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code
Published 2025-01-01“…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
Get full text
Article -
267
A DFT insight into the potential of cycloparaphenylenes as efficient sensors for detecting Paracetamol
Published 2025-03-01“…This study presents a computational investigation into the sensing capabilities of methylene-bridged [n]cycloparaphenylene ([n]MCPP, where n= 6, 8, and 10) nanorings for the detection of paracetamol using density functional theory (DFT) calculations. …”
Get full text
Article -
268
Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks
Published 2025-07-01“…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
Get full text
Article -
269
Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin
Published 2025-08-01“…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
Get full text
Article -
270
Myoglobin expression improves T-cell metabolism and antitumor effector function
Published 2025-06-01“…Although T cells expressing Mb exhibited increased expression of effector cytokines, PD-1 was still detected and targetable by anti-PD-1 monoclonal antibodies, which in combination with transfer of Mb-expressing T cells demonstrated maximal efficacy in delaying tumor growth.Conclusion Taken together, we show that expression of Mb in T cells can increase their metabolism, infiltration into the tumor tissue, and effector function against cancer cells.…”
Get full text
Article -
271
Assessing the stability of indoor farming systems using data outlier detection
Published 2025-03-01Get full text
Article -
272
LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model
Published 2025-06-01“…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
Get full text
Article -
273
Automated quantification reveals hyperglycemia inhibits endothelial angiogenic function.
Published 2014-01-01Get full text
Article -
274
-
275
Advances in the detection of virulence genes of Staphylococcus aureus originate from food
Published 2020-03-01Get full text
Article -
276
Improving dependability with low power fault detection model for skinny-hash.
Published 2024-01-01“…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
Get full text
Article -
277
A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone
Published 2024-08-01“…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
Get full text
Article -
278
Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning
Published 2025-01-01“…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as “black boxes” that limit their practical utility. …”
Get full text
Article -
279
Study on lightweight strategies for L-YOLO algorithm in road object detection
Published 2025-03-01“…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
Get full text
Article -
280
RipFinder: real-time rip current detection on mobile devices
Published 2025-05-01“…To address this, we propose a client-server ML model-based computer vision system designed specifically to improve rip current detection accuracy. This novel approach enables the app to function with or without internet connectivity, proving particularly beneficial in regions without lifeguards or internet access. …”
Get full text
Article