Search alternatives:
sourcess » source (Expand Search), success (Expand Search)
resource » source (Expand Search)
functions » function (Expand Search)
Showing 521 - 540 results of 1,810 for search '((( sourcess OR resource) detection functions ) OR ( sources detection functions ))', query time: 0.31s Refine Results
  1. 521

    A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment by Joelle Kabdjou, Norihiko Shinomiya

    Published 2025-01-01
    “…However, traditional hardware-based middleboxes limit flexibility and scalability, leading to the adoption of Network Function Virtualization (NFV). NFV enables the deployment of network functions as software, optimizing resource allocation and reducing costs. …”
    Get full text
    Article
  2. 522
  3. 523

    BiEHFFNet: A Water Body Detection Network for SAR Images Based on Bi-Encoder and Hybrid Feature Fusion by Bin Han, Xin Huang, Feng Xue

    Published 2025-07-01
    “…Water body detection in synthetic aperture radar (SAR) imagery plays a critical role in applications such as disaster response, water resource management, and environmental monitoring. …”
    Get full text
    Article
  4. 524

    VIRify: An integrated detection, annotation and taxonomic classification pipeline using virus-specific protein profile hidden Markov models. by Guillermo Rangel-Pineros, Alexandre Almeida, Martin Beracochea, Ekaterina Sakharova, Manja Marz, Alejandro Reyes Muñoz, Martin Hölzer, Robert D Finn

    Published 2023-08-01
    “…Overall, we demonstrate that VIRify is a novel and powerful resource that offers an enhanced capability to detect a broad range of viral contigs and taxonomically classify them.…”
    Get full text
    Article
  5. 525

    A Lightweight Method for Road Defect Detection in UAV Remote Sensing Images with Complex Backgrounds and Cross-Scale Fusion by Wenya Zhang, Xiang Li, Lina Wang, Danfei Zhang, Pengfei Lu, Lei Wang, Chuanxiang Cheng

    Published 2025-06-01
    “…Moreover, the CAA attention mechanism is employed to strengthen the model’s global feature extraction abilities; (2) a cross-scale feature fusion strategy known as GFPN is developed to tackle the problem of diverse target scales in road damage detection; (3) to reduce computational resource consumption, a lightweight detection head called EP-Detect has been specifically designed to decrease the model’s computational complexity and the number of parameters; and (4) the model’s localization capability for road damage targets is enhanced by integrating an optimized regression loss function called WiseIoUv3. …”
    Get full text
    Article
  6. 526

    A SERS‐Based Antibody‐Aptamer Sandwich Assay for Extracellular Vesicle‐Associated Tau Detection Using Gold Nanoparticles by Saqer Al Abdullah, Samaneh Ghadami, Md. Arifur Rahman Khan, Farbod Ebrahimi, Kyle Nowlin, Tetyana Ignatova, Kristen Dellinger

    Published 2025-08-01
    “…Subsequently, adding gold nanoparticles functionalized with SERS probes and aptamers enabled the detection of tau in EVs using SERS. …”
    Get full text
    Article
  7. 527

    DETECTION AND SYSTEMATIZATION OF SIGNS AND MARKERS OF MODIFICATIONS IN MEDIA CONTENT FOR THE DEVELOPMENT OF A METHODOLOGY TO ENHANCING CRITICAL THINKING IN THE ERA OF DEEPFAKES by Ганна Чемерис

    Published 2024-02-01
    “…The paper focuses on creating a comprehensive framework for detecting manipulated content and identifying indicators such as pixelization, unnatural expressions, etc. …”
    Get full text
    Article
  8. 528
  9. 529
  10. 530

    Karbon dots (C-dots) dari Bahan Hayati untuk Deteksi Logam Berat by Cut Navita Rahmi, Sri Sugiarti, Alvian Dea Yuliani

    Published 2023-05-01
    “…This study aims to review carbon nanoparticles derived from natural sources for detecting heavy metals. C-dots derived from biological sources have been widely studied as selective heavy metal detection. …”
    Get full text
    Article
  11. 531

    Empowering Healthcare: TinyML for Precise Lung Disease Classification by Youssef Abadade, Nabil Benamar, Miloud Bagaa, Habiba Chaoui

    Published 2024-10-01
    “…However, it has limitations, such as a lack of recording functionality, dependence on the expertise and judgment of physicians, and the absence of noise-filtering capabilities. …”
    Get full text
    Article
  12. 532
  13. 533
  14. 534

    Short-Circuit Protection Circuit With Current Slope-to-Digital Conversion Short-Circuit Detection and Adaptive Soft Turn-Off by Seungjik Lee, Jinman Myung, Geonwoo Park, Yoseph Kim, Ockgoo Lee, Ilku Nam

    Published 2025-01-01
    “…It ensures that the drain–source voltage overshoot remains below 14.5% of the drain–source voltage while achieving a consistent response delay of approximately 750 ns for short-circuit detection and a turn-off time of approximately 500 ns for soft turn-off operation.…”
    Get full text
    Article
  15. 535
  16. 536
  17. 537

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…Deep learning (DL) models show strong potential in detecting DoW attacks, where attackers disrupt services by exploiting system resources. …”
    Get full text
    Article
  18. 538

    RE-YOLO: An apple picking detection algorithm fusing receptive-field attention convolution and efficient multi-scale attention. by Jinxue Sui, Li Liu, Zuoxun Wang, Li Yang

    Published 2025-01-01
    “…The accuracy of current apple picking detection algorithms is still limited when the distribution is dense and occlusion exists, and there is a significant challenge in deploying current high accuracy detection models on edge devices with limited computational resources. …”
    Get full text
    Article
  19. 539

    Detection of power theft in sensitive stations based on generalized robust distance metric and multi-classification support vector machine by Wei Zhang, Qiong Cao, Shuai Yang, Hao Guo

    Published 2025-04-01
    “…Through training and optimization, the support vector machine outputs the detection results of electricity stealing behavior according to the decision function, and realizes the accurate detection of electricity stealing behavior. …”
    Get full text
    Article
  20. 540