-
21
Toward Compliance and Transparency in Raw Material Sourcing With Blockchain and Edge AI
Published 2025-01-01“…This low-power device enables real-time detection of shipment anomalies such as tampering or unauthorized access, even in offline and resource-limited environments. …”
Get full text
Article -
22
Improved UAV Target Detection Model for RT-DETR
Published 2025-01-01“…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
Get full text
Article -
23
-
24
Analytical method for determining coordinates of the radiation source in a homogeneous medium
Published 2015-12-01“…The problem is reduced to finding the minimum of a nonlinear function of five variables. This function is the sum of the squares of the differences of the calculated and the actual time of the wave front passing through the sensor for each of the sensors. …”
Get full text
Article -
25
DIAMOND2GO: rapid Gene Ontology assignment and enrichment detection for functional genomics
Published 2025-08-01Get full text
Article -
26
The FAST Ursa Major Supergroup H i Survey (FUMaS): Catalog and H i Mass Function
Published 2025-01-01“…Among them, 55 H i sources were detected for the first time, of which 32 do not have known optical redshifts. …”
Get full text
Article -
27
-
28
-
29
Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems
Published 2024-01-01“…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
Get full text
Article -
30
A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm
Published 2025-06-01“…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
Get full text
Article -
31
-
32
Detecting ROM changes using KINOVEA after muscle decontracture technique
Published 2024-06-01Get full text
Article -
33
-
34
-
35
Simulation Study on Detection and Localization of a Moving Target Under Reverberation in Deep Water
Published 2024-12-01“…Deep-water reverberation caused by multiple reflections from the seafloor and sea surface can affect the performance of active sonars. To detect a moving target under reverberation conditions, a reverberation suppression method using multipath Doppler shift in deep water and wideband ambiguity function (WAF) is proposed. …”
Get full text
Article -
36
Axial-UNet++ Power Line Detection Network Based on Gated Axial Attention Mechanism
Published 2024-12-01Get full text
Article -
37
An Improved Diagnosis Approach for Short-Circuit Fault Diagnosis in MPC-Based Current Source Inverter System
Published 2025-01-01“…It then leverages the cost function results from the MPC algorithm as the key diagnostic parameter derived through a comparative analysis of predicted system behavior under normal and fault conditions. …”
Get full text
Article -
38
Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model
Published 2025-04-01“…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
Get full text
Article -
39
Attraction and aversion of noctuid moths to fermented food sources coordinated by olfactory receptors from distinct gene families
Published 2025-01-01“…Conclusions Our findings suggest that this functional conservation is an olfactory adaptation that has allowed noctuid moths to extend their diet to fermented food sources.…”
Get full text
Article -
40
Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection
Published 2025-07-01“…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
Get full text
Article