Search alternatives:
resourcessssssss » resourcesssssssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resourcessssssss » resourcesssssssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
461
Optimization of CNN Activation Functions using Xception for South Sulawesi Batik Classification
Published 2025-09-01“…The results demonstrate that selecting an optimal activation function substantially enhances convolutional neural network classification of complex batik patterns. …”
Get full text
Article -
462
Morphological and functional characteristics of Trichinella sp. larvae in bears and badgers in the Kirov Region
Published 2022-03-01“…For postmortem diagnosis of trichinellosis in the obtained bears and badgers, we can use trichinelloscopy and peptolysis methods which are aimed at detecting infection sources and preventing zoonosis in humans.…”
Get full text
Article -
463
Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading
Published 2021-08-01“…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
Get full text
Article -
464
Brain tumor detection through image fusion using whale optimization and edge preserving filter
Published 2025-03-01Get full text
Article -
465
Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China
Published 2025-05-01“…However, in rural and mountainous areas, the resolution and accessibility of remote sensing satellite images from a single source are poor, making it difficult to detect greenhouses and rural buildings effectively and automatically. …”
Get full text
Article -
466
-
467
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
Get full text
Article -
468
Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring
Published 2022-11-01“…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
Get full text
Article -
469
CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8.
Published 2025-01-01“…First, the bottleneck of the C2f module in the original yolov8 network is replaced with the residual Faster-Block module in FasterNet, and then the new channel mixer convolution GLU (CGLU) in TransNeXt is combined with it to construct the C2f-faster-CGLU module, reducing the number of model parameters and computational load; Secondly, the SPPF module is combined with the large separable kernel attention (LSKA) to construct the SPPF-LSKA module, which greatly enhances the feature extraction ability of the model; Then, by adding a small target detection layer, the accuracy of small target detection such as traffic signs is greatly improved; Finally, the Inner-IoU and MPDIoU loss functions are integrated to construct WISE-Inner-MPDIoU, which replaces the original CIoU loss function, thereby improving the calculation accuracy. …”
Get full text
Article -
470
-
471
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
Get full text
Article -
472
AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11.
Published 2025-01-01“…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
Get full text
Article -
473
Measuring the Company’s Capabilities and Assessing their Impact on Its Economic Results: Analytic Tools
Published 2024-08-01“…Based on this model, methodological guidelines have been developed for measuring the capabilities of organizations and assessing their impact on the final results, a value-functional approach to selecting appropriate indicators, and analytical tools. …”
Get full text
Article -
474
Modelling groundwater futures under climatic uncertainty for local policy and planning: A case of quantification of groundwater resources at sub-regional level in the Ganges basin
Published 2025-06-01“…This study looks at how future groundwater levels will be affected by climate change in relation to important functioning thresholds that are typical for aquifers that replenish periodically. …”
Get full text
Article -
475
Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors
Published 2024-12-01“…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
Get full text
Article -
476
Documenting the Production Process of Faba bean (Vicia faba L.) in Gorgan, Ali Abadkatol and Aqqola Regions
Published 2024-12-01Get full text
Article -
477
Cascaded Directional Coupler-Based Triplexer Working on Spectroscopically Relevant Wavelengths for Multiple Gas Detection
Published 2025-02-01“…The triplexer’s functions focus on enhancing the coupling efficiency and selectivity, while facilitating the on-chip integration of diode lasers. …”
Get full text
Article -
478
Harnessing Deep Learning With AlexNet for Tomato Leaf Disease Detection in the Indian Himalayan Terrain
Published 2025-01-01“…Agriculture is essential for living in the Indian Himalayan region (IHR), as it functions as the main occupation and source of income. …”
Get full text
Article -
479
Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability
Published 2025-05-01“…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
Get full text
Article -
480
Functional Elements of Entrusted Professional Activities for Dental Educators: Protocol for a Scoping Review
Published 2025-06-01“…ObjectiveThis paper presents a scoping review protocol aimed at systematically elucidating the extent, range, and nature of the literature on EPAs for dental educators, as evaluated in the included resources. This review seeks to answer the following research question: what are the key functional elements of EPAs for dental educators as described in the existing literature? …”
Get full text
Article