Search alternatives:
functions » function (Expand Search)
resourcess » resourcesss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resourcess » resourcesss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
-
281
ChiMSource improves the accuracy of studies on novel amino acid sequences by predicting alternative sources of mass spectrometry-derived peptides
Published 2025-01-01“…Here, we present a highly flexible program that predicts alternative chimeric and non-chimeric sources of peptides detected by MS proteomics.…”
Get full text
Article -
282
Multi task detection method for operating status of belt conveyor based on DR-YOLOM
Published 2025-06-01“…A single network is used to simultaneously recognize large-sized coal blocks, detect belt edges, and detect coal flow status. Compared with using a separate model for each task, integrating three different necks and heads into a model with a shared backbone can save a lot of computing resources and inference time. …”
Get full text
Article -
283
New groups of highly divergent proteins in families as old as cellular life with important biological functions in the ocean
Published 2025-06-01“…Results Here, we used an iterative, network-based approach for remote homology detection, to probe a dataset of 40 million ORFs predicted in marine environments. …”
Get full text
Article -
284
A Feature-Selective Independent Component Analysis Method for Functional MRI
Published 2007-01-01“…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
Get full text
Article -
285
Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection
Published 2025-05-01“…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
Get full text
Article -
286
-
287
Automated identification of soil functional components based on NanoSIMS data
Published 2024-12-01“…The tool is provided as an open-source software toolbox (NanoT). In addition, a two-step unsupervised segmentation method was developed to identify soil functional components based on NanoSIMS analyses. …”
Get full text
Article -
288
Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection
Published 2025-01-01“…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
Get full text
Article -
289
Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms
Published 2021-01-01“…To this end, many research works in the literature offer users some tools that can help them take advantage of this mine of information. Community detection is one of these tools and aims to detect a set of entities that share some features within a social network. …”
Get full text
Article -
290
SSB: Smart Contract Security Detection Tool Suitable for Industrial Control Scenarios
Published 2025-07-01“…The framework’s ability to model industrial invariants—covering security, functionality, consistency, time-related, and resource consumption aspects—provides a robust mechanism to prevent critical errors like unauthorized access or premature equipment operation. …”
Get full text
Article -
291
-
292
Video Analysis and Frame Prediction Based on Improved Object Detection and ConvGRU
Published 2025-01-01“…The loss function and average accuracy mean have been improved, with a maximum detection accuracy of 0.947. …”
Get full text
Article -
293
Research on Underwater Target Detection Technology Based on SMV-YOLOv11n
Published 2025-01-01“…High-precision underwater object detection is a crucial component for improving the efficiency of marine resource development. …”
Get full text
Article -
294
3L-YOLO: A Lightweight Low-Light Object Detection Algorithm
Published 2024-12-01“…Existing methods often use image enhancement to improve detection, which results in a large amount of computational resource consumption. …”
Get full text
Article -
295
Automatic detection of foreign object intrusion along railway tracks based on MACENet.
Published 2025-01-01“…Ensuring high accuracy and efficiency in foreign object intrusion detection along railway lines is critical for guaranteeing railway operational safety under limited resource conditions. …”
Get full text
Article -
296
Rice disease detection method based on multi-scale dynamic feature fusion
Published 2025-05-01“…These optimizations enable efficient deployment on resource-constrained mobile devices, making the model highly suitable for real-time disease detection in practical agricultural scenarios where hardware limitations are critical. …”
Get full text
Article -
297
Portable cotton swab biosensor for rapid naked-eye detection of Helicobacter pylori
Published 2025-09-01“…These findings support the biosensor's utility as a point-of-care diagnostic tool in low-resource settings for the early detection and surveillance of H. pylori infections.…”
Get full text
Article -
298
Real time wire rope detection method based on Rockchip RK3588
Published 2025-08-01“…To enhance non-destructive wire rope inspection, a Mini-YOLO model was developed by integrating MobileNetV3, the Coordinate Attention (CA) mechanism, and a novel loss function, Inner-IoU, into the YOLOv8 framework. This paper’s innovation lies not in creating algorithmic components from scratch, but in their synergistic integration and targeted optimization to solve the specific challenges of real-time defect detection on resource-constrained edge devices. …”
Get full text
Article -
299
An improved lightweight tiny-person detection network based on YOLOv8: IYFVMNet
Published 2025-04-01“…IntroductionIn the aviation field, drone search and rescue is a highly urgent task involving small target detection. In such a resource-constrained scenario, there are challenges of low accuracy and high computational requirements.MethodsThis paper proposes IYFVMNet, an improved lightweight detection network based on YOLOv8. …”
Get full text
Article -
300
Object detection with afordable robustness for UAV aerial imagery: model and providing method
Published 2024-08-01“…The model and method for ensuring the robustness of resource-constrained neural network systems for object detection in aerial video surveillance. …”
Get full text
Article