Search alternatives:
resource » source (Expand Search)
Showing 21 - 40 results of 2,685 for search '((( success OR resource) detection functions ) OR ( sources detection function ))', query time: 0.36s Refine Results
  1. 21
  2. 22

    The Cosmic Evolution of Fast Radio Bursts Inferred from the CHIME/FRB Baseband Catalog 1 by Om Gupta, Paz Beniamini, Pawan Kumar, Steven L. Finkelstein

    Published 2025-01-01
    “…We find the energy distribution is described well by a Schechter function with a power-law slope of $-1.9{4}_{-0.12}^{+0.14}$ . …”
    Get full text
    Article
  3. 23

    Introduction of AI Technology for Objective Physical Function Assessment by Nobuji Kouno, Satoshi Takahashi, Masaaki Komatsu, Yusuke Sakaguchi, Naoaki Ishiguro, Katsuji Takeda, Kyoko Fujioka, Ayumu Matsuoka, Maiko Fujimori, Ryuji Hamamoto

    Published 2024-11-01
    “…This paper explored how artificial intelligence (AI) could predict physical function scores from various patient data sources and reviewed methods to measure objective physical function using this technology. …”
    Get full text
    Article
  4. 24

    Advances in preparation and application of coal-based functional nanomaterials by Shenyong LI, Shenjun QIN, Changquan MEN, Jiajia HOU, Dawei LYU, Xue ZHENG, Wei PANG, Longlong HAO, Daoyuan ZHAO, Shaozhuo ZHANG

    Published 2025-07-01
    “…China’s energy resource endowment, characterized by “abundant coal but scarce oil”, establishes coal’s fundamental role in the national energy system. …”
    Get full text
    Article
  5. 25

    Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals by V. B. Manelis, I. S. Faustov, V. A. Kozmin

    Published 2025-07-01
    “…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
    Get full text
    Article
  6. 26

    Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information by Wenqing Zhou, Chaoqiang Chen, Qin Yan, Bin Li, Kang Liu, Yingjun Zheng, Hongming Yang, Hui Xiao, Sheng Su

    Published 2025-01-01
    “…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
    Get full text
    Article
  7. 27
  8. 28

    A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells by Yang Yang, Jing Zhang, Xin Shu, Lei Pan, Ming Zhang

    Published 2024-01-01
    “…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
    Get full text
    Article
  9. 29
  10. 30
  11. 31

    Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression by Kyusoon Kim, Seunghee Oh, Kiwook Bae, Hee-Seok Oh

    Published 2025-01-01
    “…To exploit the consecutive nature of OES data, we propose a prediction method based on a functional approach using multivariate functional partial least squares regression, coupled with dimension reduction and a novel outlier detection technique via functional independent component analysis. …”
    Get full text
    Article
  12. 32

    Functionalized hydrogel-based colorimetric sensor for Cu2+ detection by Minh-Kha Nguyen, Chau-Nha-Trang Nguyen, Khanh-Binh Vo

    Published 2025-01-01
    “…., highly toxic and bioaccumulative contaminants in water sources, has become a critical environmental concern. …”
    Get full text
    Article
  13. 33

    Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report by Zhihui Yang, Xiaojie Huang, Danting Zhou, Tao Tang, Hengxing Liang, Wenliang Liu, Fenglei Yu, Chen Chen

    Published 2025-01-01
    “…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
    Get full text
    Article
  14. 34

    PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels by Wang Yin, Zhao Jingyong, Xie Gang, Zhao Zhicheng, Hu Xiao

    Published 2024-01-01
    “…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
    Get full text
    Article
  15. 35

    MIF-YOLO: An Enhanced YOLO with Multi-Source Image Fusion for Autonomous Dead Chicken Detection by Jiapan Li, Yan Zhang, Yong Zhang, Hongwei Shi, Xianfang Song, Chao Peng

    Published 2025-12-01
    “…Addressing the paucity of automated systems for the detection of dead poultry within large-scale agricultural settings, characterized by the onerous and time-consuming manual inspection processes, this study introduces an enhanced YOLO algorithm with multi-source image fusion (MIF-YOLO) for the autonomous identification of dead chicken. …”
    Get full text
    Article
  16. 36

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  17. 37
  18. 38

    Advances in choroid-glaucoma structural-functional correlations using swept-source optical coherence tomography by Ying Tang, Yun Zhao, Qiyao Wang, Jia Li

    Published 2025-08-01
    “…Our analyses suggest that functional and structural changes in the choroid are evident in glaucoma patients as the disease progresses and that the action mechanism varies across different types of glaucoma. …”
    Get full text
    Article
  19. 39
  20. 40

    Conflict Detection of Functional Requirements Based on Clustering and Rule-Based System by Sarwosri, Umi Laili Yuhana, Siti Rochimah

    Published 2024-01-01
    “…Functional requirement identification is the initial stage in software development and a crucial step in the success of software development. …”
    Get full text
    Article