Search alternatives:
functions » function (Expand Search)
Showing 141 - 160 results of 907 for search '((( source OR source) detection functions ) OR ( sources detection functions ))', query time: 0.26s Refine Results
  1. 141

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  2. 142

    Urban Traffic State Sensing and Analysis Based on ETC Data: A Survey by Yizhe Wang, Ruifa Luo, Xiaoguang Yang

    Published 2025-06-01
    “…The construction of multi-source data fusion frameworks enables effective complementarity between ETC data, floating car data, and video detection data, significantly improving traffic state estimation accuracy. …”
    Get full text
    Article
  3. 143

    Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals by V. B. Manelis, I. S. Faustov, V. A. Kozmin

    Published 2025-07-01
    “…Under the conditions of a priori uncertainty and low signal-to-noise ratios, the detection of periodic pulse signals, estimation of their parameters, and direction finding of the source is a non-trivial task.Aim. …”
    Get full text
    Article
  4. 144

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  5. 145

    Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection by Agnieszka Kraft, Michaela B. Kirschner, Vanessa Orlowski, Manuel Ronner, Caroline Bodmer, Valentina Boeva, Isabelle Opitz, Mayura Meerang

    Published 2025-02-01
    “…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
    Get full text
    Article
  6. 146

    Introduction of AI Technology for Objective Physical Function Assessment by Nobuji Kouno, Satoshi Takahashi, Masaaki Komatsu, Yusuke Sakaguchi, Naoaki Ishiguro, Katsuji Takeda, Kyoko Fujioka, Ayumu Matsuoka, Maiko Fujimori, Ryuji Hamamoto

    Published 2024-11-01
    “…This paper explored how artificial intelligence (AI) could predict physical function scores from various patient data sources and reviewed methods to measure objective physical function using this technology. …”
    Get full text
    Article
  7. 147

    Fast detection method for radionuclides based on Sequential Bayesian approach by WAN Linjian, ZHANG Xuan, ZHANG Chunlei, HUANG Jianwei, LIU Jiacheng, ZHANG Xiaole, LI Dehong, YANG Zhijun

    Published 2025-01-01
    “…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
    Get full text
    Article
  8. 148

    Schizophrenia Detection and Classification: A Systematic Review of the Last Decade by Arghyasree Saha, Seungmin Park, Zong Woo Geem, Pawan Kumar Singh

    Published 2024-11-01
    “…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
    Get full text
    Article
  9. 149

    A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells by Yang Yang, Jing Zhang, Xin Shu, Lei Pan, Ming Zhang

    Published 2024-01-01
    “…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
    Get full text
    Article
  10. 150

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  11. 151

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  12. 152
  13. 153

    Nitrate Nitrogen Quantification via Ultraviolet Absorbance: A Case Study in Agricultural and Horticultural Regions in Central China by Yiheng Zang, Jing Chen, Muhammad Awais, Mukhtar Iderawumi Abdulraheem, Moshood Abiodun Yusuff, Kuan Geng, Yongqi Chen, Yani Xiong, Linze Li, Yanyan Zhang, Vijaya Raghavan, Jiandong Hu, Junfeng Wu, Guoqing Zhao

    Published 2025-05-01
    “…Soil nitrate nitrogen (NO<sub>3</sub><sup>−</sup>-N) is a key indicator of agricultural non-point source pollution. The ultraviolet (UV) dual-wavelength method is widely used for NO<sub>3</sub><sup>−</sup>-N detection, but interference from complex soil organic matter affects its accuracy. …”
    Get full text
    Article
  14. 154

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  15. 155

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article
  16. 156

    LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model by Syahrul Munir, Huei-Yung Lin

    Published 2025-06-01
    “…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
    Get full text
    Article
  17. 157

    Enhanced object detection in low-visibility haze conditions with YOLOv9s. by Yang Zhang, Bin Zhou, Xue Zhao, Xiaomeng Song

    Published 2025-01-01
    “…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
    Get full text
    Article
  18. 158

    PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels by Wang Yin, Zhao Jingyong, Xie Gang, Zhao Zhicheng, Hu Xiao

    Published 2024-01-01
    “…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
    Get full text
    Article
  19. 159

    Realizing depth measurement and edge detection based on a single metasurface by Yang Siwen, Wei Qunshuo, Zhao Ruizhe, Li Xin, Zhang Xue, Li Yao, Li Junjie, Jing Xiaoli, Li Xiaowei, Wang Yongtian, Huang Lingling

    Published 2023-07-01
    “…Double helix point source function is utilized, and three verification experiments are carried out, including double-helix beam calibration, 2D object and 3D object detection, respectively. …”
    Get full text
    Article
  20. 160

    An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions by Diako Mardanbegi, Andrew T. N. Kurauchi, Carlos H. Morimoto

    Published 2018-06-01
    “…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
    Get full text
    Article