Search alternatives:
resourcess » resource (Expand Search), resourcesss (Expand Search)
functions » function (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resourcess » resource (Expand Search), resourcesss (Expand Search)
functions » function (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
241
A lightweight object detection approach based on edge computing for mining industry
Published 2024-11-01“…These enhancements enable more accurate and efficient detection in resource‐constrained edge environments, contributing to safer and more reliable monitoring in coal mining operations.…”
Get full text
Article -
242
MeStanG—Resource for High-Throughput Sequencing Standard Data Sets Generation for Bioinformatic Methods Evaluation and Validation
Published 2025-01-01“…Metagenomics analysis has enabled the measurement of the microbiome diversity in environmental samples without prior targeted enrichment. Functional and phylogenetic studies based on microbial diversity retrieved using HTS platforms have advanced from detecting known organisms and discovering unknown species to applications in disease diagnostics. …”
Get full text
Article -
243
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article -
244
Optimization of train obstacle detection based on zone media controller unit
Published 2024-11-01“…In addition, the need for comprehensive train detection including pantograph-catenary systems and running gears, lead to an increased number of on-board devices, resulting in fewer computational resources available for each detection system, and complicating equipment installation and maintenance. …”
Get full text
Article -
245
Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions
Published 2025-01-01“…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
Get full text
Article -
246
Automated quantification reveals hyperglycemia inhibits endothelial angiogenic function.
Published 2014-01-01Get full text
Article -
247
Identification, functional analysis, and clinical applications of defective viral genomes
Published 2025-07-01Get full text
Article -
248
Enhanced object detection in low-visibility haze conditions with YOLOv9s.
Published 2025-01-01“…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
Get full text
Article -
249
PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels
Published 2024-01-01“…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
Get full text
Article -
250
The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping
Published 2025-03-01“…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
Get full text
Article -
251
Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin
Published 2025-08-01“…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
Get full text
Article -
252
TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code
Published 2025-01-01“…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
Get full text
Article -
253
Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks
Published 2025-07-01“…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
Get full text
Article -
254
Water quality anomaly detection research based on GRU-PINN model
Published 2025-01-01“…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
Get full text
Article -
255
Realizing depth measurement and edge detection based on a single metasurface
Published 2023-07-01“…Double helix point source function is utilized, and three verification experiments are carried out, including double-helix beam calibration, 2D object and 3D object detection, respectively. …”
Get full text
Article -
256
Fuzzy deep learning architecture for cucumber plant disease detection and classification
Published 2025-05-01“…The proposed approach is efficient and feasible, offering a more stable and accurate disease detection system while utilizing fewer resources. This work demonstrates the potential of AI-driven solutions in agriculture, particularly in improving disease detection and crop yield through advanced machine learning techniques.…”
Get full text
Article -
257
LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model
Published 2025-06-01“…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
Get full text
Article -
258
Plug-and-Play Robust Aerial Object Detection Under Hazy Conditions
Published 2024-01-01“…Moreover, we also propose a detection feature pyramid loss function to more accurately restore object features. …”
Get full text
Article -
259
A review of deep learning models to detect malware in Android applications
Published 2023-12-01“…Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions. …”
Get full text
Article -
260
DEM-based topographic change detection considering the spatial distribution of errors
Published 2025-03-01Get full text
Article