Showing 541 - 560 results of 2,583 for search '((( resourcessssssss OR resources) selection functions ) OR ( sources detection function ))', query time: 0.28s Refine Results
  1. 541
  2. 542

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  3. 543

    A COMPREHENSIVE EVALUATION OF DIGITAL TRANSFORMATION ACROSS MULTIPLE BUSINESS FUNCTIONS IN SOUTH AFRICAN SMMES: INSIGHTS POST-COVID-19 by Nomfundo Gladys Khoza, Walter Mthuthuzeli Mkosana

    Published 2025-07-01
    “…This systematic literature review evaluates how digital technologies have reshaped business functions within South African SMMEs, particularly following the COVID-19 pandemic. …”
    Get full text
    Article
  4. 544

    Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber by Jiang Tang, Yongwen Tang, Kun He, Luluzi Lu, Di Zhang, Mengfan Cheng, Lei Deng, Deming Liu, Minming Zhang

    Published 2018-01-01
    “…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
    Get full text
    Article
  5. 545
  6. 546
  7. 547
  8. 548

    Implementation of a Smart Home Intruder Detection System using a Vibrometer and ESP 32 CAM by Samuel Owoeye, Folasade Durodola, Adekunle Oyelami, Racheal Oladejo, Samuel Obasuyi, Ademola Qasim, Joshua Ogundairo

    Published 2025-01-01
    “…The topic of security is quite important; hence this paper presents the development and implementation of a Smart Intruder Detection System utilizing the ESP32-CAM board, the Vibrometer and the ATMega328P microcontroller to enhance lighting, security, and surveillance functionalities. …”
    Get full text
    Article
  9. 549
  10. 550

    Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly by Wei-Jiun Lin, Fang-Ling Chloe Liu, Lucie Cho, Chin-Cheng Scotty Yang

    Published 2025-04-01
    “…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
    Get full text
    Article
  11. 551

    Integrated Machine Learning and Region Growing Algorithms for Enhanced Concrete Crack Detection: A Novel Approach by Wenxuan Yao, Hui Li, Yanlin Li

    Published 2024-10-01
    “…Firstly, the regression method learns the image features of the dataset and the specific region growth threshold, and the regression function is trained by using the open-source dataset to determine the region growth threshold using the characteristics of the images included in the tests. …”
    Get full text
    Article
  12. 552

    Abstract 260: TCD Bubble test as a Screening tool for detection of Patent Foramen Ovale in Stroke by Danish Ahammed PK, Paul Alapatt, Aiswarya Raj, Ashraf VV, Shafeed Mattummal

    Published 2023-11-01
    “…Introduction Introduction & Objectives: Transcranial Doppler (TCD) ultrasound provides rapid, noninvasive, real‐time measures of cerebrovascular function. Patent Foramen Ovale (PFO) is fourfold more common in Young Stroke Patients <55 years of age, as opposed to age‐matched controls. …”
    Get full text
    Article
  13. 553

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
    Get full text
    Article
  14. 554
  15. 555
  16. 556
  17. 557
  18. 558

    Detection and classification of hypertensive retinopathy based on retinal image analysis using a deep learning approach by Bambang Krismono Triwijoyo, Ahmat Adil, Muhammad Zulfikri

    Published 2025-01-01
    “…These gap factors make the research on hypertensive retinopathy urgent since it requires an early detection model to improve treatment accuracy and prevent heart attacks and strokes before they happen. …”
    Get full text
    Article
  19. 559

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  20. 560