Showing 1 - 20 results of 2,089 for search '((( source OR sources) detection function ) OR ( sources selection function ))', query time: 0.34s Refine Results
  1. 1
  2. 2
  3. 3

    Potential Source Density Function: A New Tool for Identifying Air Pollution Sources by In Sun Kim, Yong Pyo Kim, Daehyun Wee

    Published 2022-01-01
    “…Abstract Potential source density function (PSDF) is developed to identify, that is, locate and quantify, source areas of ambient trace species based on Gaussian process regression (GPR), a machine-learning technique. …”
    Get full text
    Article
  4. 4

    New source of cellulase production using a metagenomic technique by Safaa M. Ali, Nadia A. Soliman

    Published 2019-12-01
    “…In the outlook, the metagenomic guide approachs may be functional to the elevated selection of novel cellulase from the environment.…”
    Get full text
    Article
  5. 5

    Development of Time-Reversal Method for Impact Source Identification on Plate Structures by Chunlin Chen, Yulong Li, Fuh-Gwo Yuan

    Published 2013-01-01
    “…A number of parameters selected for determining the impact location, approximated transfer functions and steps taken for reconstructing the impact loading time-history are also examined. …”
    Get full text
    Article
  6. 6

    ABDviaMSIFAT: Abnormal Crowd Behavior Detection Utilizing a Multi-Source Information Fusion Technique by Ali Ahmad Hamid, S. Amirhassan Monadjemi, Bijan Shoushtarian

    Published 2025-01-01
    “…To solve this issue, we suggest a new method that combines data from various sources with different characteristics to enhance the precision of detecting human behavior in crowds. …”
    Get full text
    Article
  7. 7
  8. 8

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  9. 9

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  10. 10

    Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods by Petro E. Mabeyo, Mkabwa L. K. Manoko, Amra Gruhonjic, Paul A. Fitzpatrick, Göran Landberg, Máté Erdélyi, Stephen S. Nyandoro

    Published 2015-01-01
    “…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
    Get full text
    Article
  11. 11

    Go Source Code Vulnerability Detection Method Based on Graph Neural Network by Lisha Yuan, Yong Fang, Qiang Zhang, Zhonglin Liu, Yijia Xu

    Published 2025-06-01
    “…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information by Wenqing Zhou, Chaoqiang Chen, Qin Yan, Bin Li, Kang Liu, Yingjun Zheng, Hongming Yang, Hui Xiao, Sheng Su

    Published 2025-01-01
    “…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    The Cosmic Evolution of Fast Radio Bursts Inferred from the CHIME/FRB Baseband Catalog 1 by Om Gupta, Paz Beniamini, Pawan Kumar, Steven L. Finkelstein

    Published 2025-01-01
    “…Testing two types of redshift evolution models suggests a likely combination of young and old formation channels. $3{1}_{-21}^{+31}$ % of FRB sources may track star formation, or correspondingly, FRB sources may have delay times of $1.9{4}_{-1.31}^{+1.54}$ Gyr. …”
    Get full text
    Article
  19. 19

    An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R... by Fengjun WU, Xin-Ai XU

    Published 2025-06-01
    “…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
    Get full text
    Article
  20. 20

    A Feature-Selective Independent Component Analysis Method for Functional MRI by Yi-Ou Li, Tülay Adali, Vince D. Calhoun

    Published 2007-01-01
    “…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
    Get full text
    Article