Showing 241 - 260 results of 1,810 for search '((( resourcess OR resources) detection functions ) OR ( source detection function ))', query time: 0.21s Refine Results
  1. 241

    Optimization of train obstacle detection based on zone media controller unit by ZHOU Liming, HU Jiaqiao, SHEN Tuo

    Published 2024-11-01
    “…In addition, the need for comprehensive train detection including pantograph-catenary systems and running gears, lead to an increased number of on-board devices, resulting in fewer computational resources available for each detection system, and complicating equipment installation and maintenance. …”
    Get full text
    Article
  2. 242
  3. 243

    Enhanced object detection in low-visibility haze conditions with YOLOv9s. by Yang Zhang, Bin Zhou, Xue Zhao, Xiaomeng Song

    Published 2025-01-01
    “…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
    Get full text
    Article
  4. 244

    PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels by Wang Yin, Zhao Jingyong, Xie Gang, Zhao Zhicheng, Hu Xiao

    Published 2024-01-01
    “…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
    Get full text
    Article
  5. 245

    Realizing depth measurement and edge detection based on a single metasurface by Yang Siwen, Wei Qunshuo, Zhao Ruizhe, Li Xin, Zhang Xue, Li Yao, Li Junjie, Jing Xiaoli, Li Xiaowei, Wang Yongtian, Huang Lingling

    Published 2023-07-01
    “…Double helix point source function is utilized, and three verification experiments are carried out, including double-helix beam calibration, 2D object and 3D object detection, respectively. …”
    Get full text
    Article
  6. 246

    LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model by Syahrul Munir, Huei-Yung Lin

    Published 2025-06-01
    “…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
    Get full text
    Article
  7. 247

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  8. 248
  9. 249

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  10. 250

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  11. 251

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  12. 252

    Water quality anomaly detection research based on GRU-PINN model by Zhao Xinyu

    Published 2025-01-01
    “…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
    Get full text
    Article
  13. 253

    Fuzzy deep learning architecture for cucumber plant disease detection and classification by Anas Bilal, Junaid Ali Khan, Abdulkareem Alzahrani, Khalid Almohammadi, Maha Alamri, Xiaowen Liu

    Published 2025-05-01
    “…The proposed approach is efficient and feasible, offering a more stable and accurate disease detection system while utilizing fewer resources. This work demonstrates the potential of AI-driven solutions in agriculture, particularly in improving disease detection and crop yield through advanced machine learning techniques.…”
    Get full text
    Article
  14. 254

    Plug-and-Play Robust Aerial Object Detection Under Hazy Conditions by Wei Wu, Hao Chang, Zhiwen Chen, Zhu Li

    Published 2024-01-01
    “…Moreover, we also propose a detection feature pyramid loss function to more accurately restore object features. …”
    Get full text
    Article
  15. 255

    A review of deep learning models to detect malware in Android applications by Elliot Mbunge, Benhildah Muchemwa, John Batani, Nobuhle Mbuyisa

    Published 2023-12-01
    “…Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions. …”
    Get full text
    Article
  16. 256
  17. 257

    A Universal Tire Detection Method Based on Improved YOLOv8 by Chi Guo, Mingxia Chen, Junjie Wu, Haipeng Hu, Luobing Huang, Junjie Li

    Published 2024-01-01
    “…However, traditional methods of tire defect detection have encountered problems such as slow detection speed, complex tire defect backgrounds, and limited hardware resources. …”
    Get full text
    Article
  18. 258

    Lightweight obstacle detection for unmanned mining trucks in open-pit mines by Guangwei Liu, Jian Lei, Zhiqing Guo, Senlin Chai, Chonghui Ren

    Published 2025-03-01
    “…In addition, this paper also adopts the amplitude-based layer adaptive sparse pruning algorithm (LAMP) to further compress the model size while maintaining efficient detection performance. Through this pruning strategy, the model further reduces its dependence on computing resources while maintaining key performance. …”
    Get full text
    Article
  19. 259
  20. 260

    Myoglobin expression improves T-cell metabolism and antitumor effector function by Haifeng C Xu, Diran Herebian, Ertan Mayatepek, Dirk Brenner, Aleksandra A Pandyra, Philipp A Lang, Sascha Dietrich, Julia Werner, Georgios Theodorakis, Ichiro Katahira, Mitrajit Ghosh, Michal Gorzkiewicz, Luisa de Sousa Santos, Ann Kathrin Bergmann, Max Anstötz, Anne Busch, Carsten Berndt

    Published 2025-06-01
    “…Although T cells expressing Mb exhibited increased expression of effector cytokines, PD-1 was still detected and targetable by anti-PD-1 monoclonal antibodies, which in combination with transfer of Mb-expressing T cells demonstrated maximal efficacy in delaying tumor growth.Conclusion Taken together, we show that expression of Mb in T cells can increase their metabolism, infiltration into the tumor tissue, and effector function against cancer cells.…”
    Get full text
    Article