Showing 221 - 240 results of 1,810 for search '((( source OR resource) detection functions ) OR ( sources detection function ))', query time: 0.35s Refine Results
  1. 221
  2. 222
  3. 223

    Three-Dimensional Real-Scene-Enhanced GNSS/Intelligent Vision Surface Deformation Monitoring System by Yuanrong He, Weijie Yang, Qun Su, Qiuhua He, Hongxin Li, Shuhang Lin, Shaochang Zhu

    Published 2025-04-01
    “…The system integrates GNSS monitoring terminals and multi-source meteorological sensors to accurately capture minute displacements at monitoring points and multi-source Internet of Things (IoT) data, which are then automatically stored in MySQL databases. …”
    Get full text
    Article
  4. 224

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  5. 225

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  6. 226
  7. 227

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  8. 228
  9. 229

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
    Get full text
    Article
  10. 230

    Highly Efficient Biphoton Generation from Thin Dense Atomic Ensemble by Heewoo Kim, Hansol Jeong, Han Seb Moon

    Published 2025-04-01
    “…Strongly correlated bright biphotons are generated via spontaneous four‐wave mixing from a dense atomic ensemble based on the 6S1/2–6P3/2–6D5/2 transition of 133Cs. Biphoton source achieves a detected biphoton count rate of 100 kilo‐counts per second, a heralding efficiency of 15%, and a maximum normalized crosscorrelation function value of 100 between the signal and idler photons, despite the low detector efficiency of a silicon avalanche photodetector being less than 25% at 917 nm. …”
    Get full text
    Article
  11. 231

    Integrated Machine Learning and Region Growing Algorithms for Enhanced Concrete Crack Detection: A Novel Approach by Wenxuan Yao, Hui Li, Yanlin Li

    Published 2024-10-01
    “…Firstly, the regression method learns the image features of the dataset and the specific region growth threshold, and the regression function is trained by using the open-source dataset to determine the region growth threshold using the characteristics of the images included in the tests. …”
    Get full text
    Article
  12. 232

    Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly by Wei-Jiun Lin, Fang-Ling Chloe Liu, Lucie Cho, Chin-Cheng Scotty Yang

    Published 2025-04-01
    “…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
    Get full text
    Article
  13. 233

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  14. 234

    Abstract 260: TCD Bubble test as a Screening tool for detection of Patent Foramen Ovale in Stroke by Danish Ahammed PK, Paul Alapatt, Aiswarya Raj, Ashraf VV, Shafeed Mattummal

    Published 2023-11-01
    “…Introduction Introduction & Objectives: Transcranial Doppler (TCD) ultrasound provides rapid, noninvasive, real‐time measures of cerebrovascular function. Patent Foramen Ovale (PFO) is fourfold more common in Young Stroke Patients <55 years of age, as opposed to age‐matched controls. …”
    Get full text
    Article
  15. 235
  16. 236

    Detection and classification of hypertensive retinopathy based on retinal image analysis using a deep learning approach by Bambang Krismono Triwijoyo, Ahmat Adil, Muhammad Zulfikri

    Published 2025-01-01
    “…These gap factors make the research on hypertensive retinopathy urgent since it requires an early detection model to improve treatment accuracy and prevent heart attacks and strokes before they happen. …”
    Get full text
    Article
  17. 237

    GloFinder: AI-empowered QuPath plugin for WSI-level glomerular detection, visualization, and curation by Jialin Yue, Tianyuan Yao, Ruining Deng, Siqi Lu, Junlin Guo, Quan Liu, Juming Xiong, Mengmeng Yin, Haichun Yang, Yuankai Huo

    Published 2025-04-01
    “…Artificial intelligence (AI) has demonstrated significant success in automating the detection of glomeruli—key functional units of the kidney—from whole slide images (WSIs) in kidney pathology. …”
    Get full text
    Article
  18. 238
  19. 239

    Pequi-Derived Carbon Dots as a Fluorescence Quenching Sensor for Sensitive Detection of Fe3+ Ions by B. P. Oliveira, I. M. Sampaio, J. J. P. Oliveira, S. V. Carneiro, R. A. Antunes, P. B. A. Fechine, F. O. M. S. Abreu

    Published 2025-04-01
    “…This study presents the pequi (Caryocar coriaceum) as a new biomass source for carbon dots synthesis. The pequi almond, usually discarded, was used as the biomass precursor in one-step hydrothermal green synthesis of carbon dots. …”
    Get full text
    Article
  20. 240

    Feature engineering for fault detection and diagnosis in Power Transmission Lines using a tree-based approach by Hassan N. Noura, Zaid Allal, Ola Salman, Khaled Chahine

    Published 2025-06-01
    “…The Power Transmission Line (PTL) is a pivotal infrastructure in the efficient distribution of electrical power, connecting the source generating stations to end-point consumers. …”
    Get full text
    Article